JP5080449B2 - 新しいセッション鍵の提供 - Google Patents
新しいセッション鍵の提供 Download PDFInfo
- Publication number
- JP5080449B2 JP5080449B2 JP2008507708A JP2008507708A JP5080449B2 JP 5080449 B2 JP5080449 B2 JP 5080449B2 JP 2008507708 A JP2008507708 A JP 2008507708A JP 2008507708 A JP2008507708 A JP 2008507708A JP 5080449 B2 JP5080449 B2 JP 5080449B2
- Authority
- JP
- Japan
- Prior art keywords
- key material
- random number
- user equipment
- network application
- application function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/108,610 | 2005-04-18 | ||
| US11/108,610 US7558957B2 (en) | 2005-04-18 | 2005-04-18 | Providing fresh session keys |
| PCT/US2006/013283 WO2006113206A1 (en) | 2005-04-18 | 2006-04-10 | Providing fresh session keys |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2008537445A JP2008537445A (ja) | 2008-09-11 |
| JP2008537445A5 JP2008537445A5 (https=) | 2009-06-18 |
| JP5080449B2 true JP5080449B2 (ja) | 2012-11-21 |
Family
ID=36678567
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008507708A Expired - Fee Related JP5080449B2 (ja) | 2005-04-18 | 2006-04-10 | 新しいセッション鍵の提供 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7558957B2 (https=) |
| EP (1) | EP1872513B1 (https=) |
| JP (1) | JP5080449B2 (https=) |
| KR (1) | KR101240069B1 (https=) |
| CN (1) | CN101160779B (https=) |
| WO (1) | WO2006113206A1 (https=) |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8046824B2 (en) * | 2005-04-11 | 2011-10-25 | Nokia Corporation | Generic key-decision mechanism for GAA |
| JP4741664B2 (ja) * | 2005-07-07 | 2011-08-03 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 認証及びプライバシーに対する方法及び装置 |
| US7835528B2 (en) * | 2005-09-26 | 2010-11-16 | Nokia Corporation | Method and apparatus for refreshing keys within a bootstrapping architecture |
| CN101039181B (zh) | 2006-03-14 | 2010-09-08 | 华为技术有限公司 | 防止通用鉴权框架中服务功能实体受攻击的方法 |
| US8407482B2 (en) * | 2006-03-31 | 2013-03-26 | Avaya Inc. | User session dependent URL masking |
| DE102006054091B4 (de) * | 2006-11-16 | 2008-09-11 | Siemens Ag | Bootstrapping-Verfahren |
| DE102007023206B4 (de) * | 2006-11-18 | 2008-10-09 | Dica Technologies Gmbh | Verfahren und Einrichtung zur sicheren Erzeugung und Verwaltung von Schlüsseln und deren Nutzung in Netzwerken zur sicheren Übertragung von Daten |
| KR101447726B1 (ko) * | 2006-12-08 | 2014-10-07 | 한국전자통신연구원 | 이동통신시스템에서의 인증키 생성 방법 및 갱신 방법 |
| KR20100044199A (ko) * | 2007-07-04 | 2010-04-29 | 코닌클리즈케 필립스 일렉트로닉스 엔.브이. | 트러스트 센터 링크 키를 초기화하는 네트워크 및 방법 |
| CN101163010B (zh) * | 2007-11-14 | 2010-12-08 | 华为软件技术有限公司 | 对请求消息的鉴权方法和相关设备 |
| WO2009070075A1 (en) * | 2007-11-30 | 2009-06-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Key management for secure communication |
| ES2687238T3 (es) * | 2008-02-25 | 2018-10-24 | Nokia Solutions And Networks Oy | Método de arquitectura de arranque de seguro basado en autenticación de resumen basada en contraseña |
| US20090287929A1 (en) * | 2008-05-15 | 2009-11-19 | Lucent Technologies Inc. | Method and apparatus for two-factor key exchange protocol resilient to password mistyping |
| BRPI0822761B1 (pt) * | 2008-06-06 | 2020-09-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Método para gerar uma chave criptográfica para proteger comunicação entre duas entidades, meio de armazenamento legível por computador, dispositivo adaptado para gerar uma chave criptográfica para uma entidade de comunicações, equipamento de usuário, e, sistema |
| CN101784048B (zh) * | 2009-01-21 | 2014-01-01 | 中兴通讯股份有限公司 | 动态更新密钥的身份认证和密钥协商方法及系统 |
| WO2011048551A1 (en) * | 2009-10-19 | 2011-04-28 | Nokia Corporation | User identity management for permitting interworking of a bootstrapping architecture and a shared identity service |
| EP2695410B1 (en) * | 2011-04-01 | 2017-04-19 | Telefonaktiebolaget LM Ericsson (publ) | Methods and apparatuses for avoiding damage in network attacks |
| MX2014005223A (es) * | 2011-10-31 | 2014-09-01 | Nokia Corp | Mecanismo de seguridad para codigo externo. |
| US10631162B2 (en) | 2013-10-30 | 2020-04-21 | Samsung Electronics Co., Ltd. | Method and apparatus to perform device to device communication in wireless communication network |
| WO2015166099A1 (en) * | 2014-05-02 | 2015-11-05 | Koninklijke Kpn N.V. | Method and system for providing security from a radio access network |
| US10678927B2 (en) * | 2017-08-31 | 2020-06-09 | Texas Instruments Incorporated | Randomized execution countermeasures against fault injection attacks during boot of an embedded device |
| EP3718330B1 (en) * | 2017-11-29 | 2024-09-25 | Telefonaktiebolaget LM Ericsson (publ) | Session key establishment |
| US11089480B2 (en) * | 2018-11-30 | 2021-08-10 | Apple Inc. | Provisioning electronic subscriber identity modules to mobile wireless devices |
| US20220086632A1 (en) * | 2019-01-14 | 2022-03-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for security |
| CN112054906B (zh) * | 2020-08-21 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | 一种密钥协商方法及系统 |
| US12500744B2 (en) * | 2021-09-17 | 2025-12-16 | Qualcomm Incorporated | Securing application communication |
| WO2023043724A1 (en) * | 2021-09-17 | 2023-03-23 | Qualcomm Incorporated | Securing application communication |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0722596A4 (en) * | 1991-11-12 | 1997-03-05 | Security Domain Pty Ltd | METHOD AND SYSTEM FOR SECURE, DECENTRALIZED PERSONALIZATION OF CHIP CARDS |
| US6151676A (en) * | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
| CN1332919A (zh) * | 1998-10-30 | 2002-01-23 | 塞特科公司 | 在分布加密中采用共享的随机性 |
| SE517116C2 (sv) * | 2000-08-11 | 2002-04-16 | Ericsson Telefon Ab L M | Metod och anordning för säkra kommunikationstjänster |
| JP2002344438A (ja) * | 2001-05-14 | 2002-11-29 | Nippon Telegr & Teleph Corp <Ntt> | 鍵共有システム及び装置並びにプログラム |
| US8140845B2 (en) * | 2001-09-13 | 2012-03-20 | Alcatel Lucent | Scheme for authentication and dynamic key exchange |
| US20030093663A1 (en) * | 2001-11-09 | 2003-05-15 | Walker Jesse R. | Technique to bootstrap cryptographic keys between devices |
| US7607015B2 (en) | 2002-10-08 | 2009-10-20 | Koolspan, Inc. | Shared network access using different access keys |
| CA2597475C (en) * | 2005-02-04 | 2012-09-18 | Qualcomm Incorporated | Secure bootstrapping for wireless communications |
-
2005
- 2005-04-18 US US11/108,610 patent/US7558957B2/en active Active
-
2006
- 2006-04-10 KR KR1020077023862A patent/KR101240069B1/ko not_active Expired - Fee Related
- 2006-04-10 CN CN2006800127472A patent/CN101160779B/zh not_active Expired - Fee Related
- 2006-04-10 JP JP2008507708A patent/JP5080449B2/ja not_active Expired - Fee Related
- 2006-04-10 EP EP06740801.3A patent/EP1872513B1/en not_active Expired - Lifetime
- 2006-04-10 WO PCT/US2006/013283 patent/WO2006113206A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| JP2008537445A (ja) | 2008-09-11 |
| US20060236106A1 (en) | 2006-10-19 |
| CN101160779A (zh) | 2008-04-09 |
| EP1872513A1 (en) | 2008-01-02 |
| KR101240069B1 (ko) | 2013-03-06 |
| KR20070122491A (ko) | 2007-12-31 |
| WO2006113206A1 (en) | 2006-10-26 |
| CN101160779B (zh) | 2013-04-03 |
| EP1872513B1 (en) | 2018-01-10 |
| US7558957B2 (en) | 2009-07-07 |
| WO2006113206B1 (en) | 2007-01-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5080449B2 (ja) | 新しいセッション鍵の提供 | |
| JP4865791B2 (ja) | ペアワイズ・マスタ・キーを更新する方法 | |
| JP2008538482A (ja) | ルート鍵の提供 | |
| KR101195278B1 (ko) | 무선 통신 방법 | |
| CN101005357A (zh) | 一种更新认证密钥的方法和系统 | |
| CN110868294B (zh) | 一种密钥更新方法、装置及设备 | |
| CN108040048A (zh) | 一种基于http协议的移动客户端用户动态秘钥加密通讯方法 | |
| CN117395001B (zh) | 一种基于量子密钥芯片的车联网安全通信方法及系统 | |
| CN111740985A (zh) | 一种tcp长连接安全验证加密方法 | |
| CN101039181B (zh) | 防止通用鉴权框架中服务功能实体受攻击的方法 | |
| CN116709333A (zh) | 一种消息完整性保护与校验方法及相关装置 | |
| CN106878010A (zh) | 基于安全芯片密钥对的加解密方法及装置 | |
| CN118101340B (zh) | 数据安全传输方法、装置和电子设备 | |
| CN120128912A (zh) | 用户入网安全保护方法、装置及相关设备 | |
| CN109391938A (zh) | 密钥协商方法、装置及系统 | |
| CN113316138B (zh) | 一种应用层加密实现方法及其实现装置 | |
| CN117034309A (zh) | 用户密码管理方法、计算机装置及存储介质 | |
| CN116545720A (zh) | 第三方小程序的服务提供方法和装置 | |
| CN111404669B (zh) | 一种密钥生成方法、终端设备及网络设备 | |
| Schonwalder et al. | Session resumption for the secure shell protocol | |
| CN113935736B (zh) | 一种移动端区块链安全交易系统 | |
| CN116208949B (zh) | 通信报文的加密传输方法、系统及发送终端、接收终端 | |
| CN119135456B (zh) | 基于国密算法的轻量级密钥管理方法及系统 | |
| CN120378180A (zh) | 跨域通信场景下异构工控协议安全增强方法、终端与系统 | |
| CN118803752A (zh) | 认证鉴权方法、装置及网络设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20090410 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090427 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20111019 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120119 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120126 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120419 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120802 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120830 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150907 Year of fee payment: 3 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5080449 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |