JP5855127B2 - 無線通信システムにおける短文データの暗号化方法及び装置 - Google Patents
無線通信システムにおける短文データの暗号化方法及び装置 Download PDFInfo
- Publication number
- JP5855127B2 JP5855127B2 JP2013548363A JP2013548363A JP5855127B2 JP 5855127 B2 JP5855127 B2 JP 5855127B2 JP 2013548363 A JP2013548363 A JP 2013548363A JP 2013548363 A JP2013548363 A JP 2013548363A JP 5855127 B2 JP5855127 B2 JP 5855127B2
- Authority
- JP
- Japan
- Prior art keywords
- cmac
- tek
- terminal
- rng
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2011-0002474 | 2011-01-10 | ||
| KR20110002474 | 2011-01-10 | ||
| PCT/KR2012/000236 WO2012096496A2 (en) | 2011-01-10 | 2012-01-10 | Method and apparatus for encrypting short data in a wireless communication system |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2014508436A JP2014508436A (ja) | 2014-04-03 |
| JP2014508436A5 JP2014508436A5 (enExample) | 2015-01-29 |
| JP5855127B2 true JP5855127B2 (ja) | 2016-02-09 |
Family
ID=46455260
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2013548363A Active JP5855127B2 (ja) | 2011-01-10 | 2012-01-10 | 無線通信システムにおける短文データの暗号化方法及び装置 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US8625798B2 (enExample) |
| JP (1) | JP5855127B2 (enExample) |
| KR (1) | KR101916034B1 (enExample) |
| CN (1) | CN103430478B (enExample) |
| WO (1) | WO2012096496A2 (enExample) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10298386B1 (en) * | 2009-06-26 | 2019-05-21 | Marvell International Ltd. | Method and apparatus for secure communications in networks |
| US8625798B2 (en) * | 2011-01-10 | 2014-01-07 | Samsung Electronics Co., Ltd. | Method and apparatus for encrypting short data in a wireless communication system |
| US9209886B2 (en) * | 2012-01-10 | 2015-12-08 | Electronics And Telecommunications Research Institute | Terminal and communication method thereof |
| US9942210B2 (en) * | 2012-05-23 | 2018-04-10 | Nokia Technologies Oy | Key derivation method and apparatus for local access under control of a cellular network |
| US9497142B2 (en) | 2012-11-30 | 2016-11-15 | T-Mobile Usa, Inc. | Triggering actions on a computing device |
| US9398448B2 (en) * | 2012-12-14 | 2016-07-19 | Intel Corporation | Enhanced wireless communication security |
| US10671546B2 (en) | 2015-09-30 | 2020-06-02 | Hewlett Packard Enterprise Development Lp | Cryptographic-based initialization of memory content |
| DE102017204184A1 (de) * | 2017-03-14 | 2018-09-20 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Authentisierte Bestätigungs- und Aktivierungsnachricht |
| WO2018214052A1 (en) * | 2017-05-24 | 2018-11-29 | Qualcomm Incorporated | Uplink small data transmission in inactive state |
| WO2019067056A1 (en) * | 2017-09-28 | 2019-04-04 | Apple Inc. | METHODS AND ARCHITECTURES OF SECURE TELEMETRY |
| CN110130703A (zh) * | 2018-02-08 | 2019-08-16 | 郑州大学 | 智能立体车库模拟系统 |
| SG10201906806XA (en) * | 2019-07-23 | 2021-02-25 | Mastercard International Inc | Methods and computing devices for auto-submission of user authentication credential |
| CN116249105A (zh) * | 2021-12-07 | 2023-06-09 | 中国移动通信有限公司研究院 | 密钥更新方法及装置 |
| US20240235823A1 (en) * | 2023-01-05 | 2024-07-11 | Qualcomm Incorporated | Broadcast and/or groupcast security for device-to-device positioning |
| CN116389138B (zh) * | 2023-04-07 | 2023-11-24 | 深圳市众志天成科技有限公司 | 一种基于数据传输时的信息安全保护方法及装置 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030023117A (ko) * | 2001-09-12 | 2003-03-19 | 에스케이 텔레콤주식회사 | 공개키 기반의 무선단문메시지 보안 및 인증방법 |
| US7991158B2 (en) * | 2006-12-13 | 2011-08-02 | Tyfone, Inc. | Secure messaging |
| CN101203025B (zh) * | 2006-12-15 | 2010-11-10 | 上海晨兴电子科技有限公司 | 安全的移动信息发送和接收方法 |
| WO2009132599A1 (en) * | 2008-04-30 | 2009-11-05 | Mediatek Inc. | Method for deriving traffic encryption key |
| US8666077B2 (en) * | 2008-05-07 | 2014-03-04 | Alcatel Lucent | Traffic encryption key generation in a wireless communication network |
| KR20090126166A (ko) * | 2008-06-03 | 2009-12-08 | 엘지전자 주식회사 | 트래픽 암호화 키 생성 방법 및 갱신 방법 |
| US8543091B2 (en) * | 2008-06-06 | 2013-09-24 | Ebay Inc. | Secure short message service (SMS) communications |
| WO2009150750A1 (ja) * | 2008-06-13 | 2009-12-17 | 富士通株式会社 | ゲートウェイ装置、無線送信制御方法及び無線通信システム |
| US8094635B2 (en) * | 2008-09-17 | 2012-01-10 | Qualcomm Incorporated | Method and apparatus for implementing Short Message Service in wireless communication networks |
| US8707045B2 (en) * | 2009-02-12 | 2014-04-22 | Lg Electronics Inc. | Method and apparatus for traffic count key management and key count management |
| KR20100109998A (ko) * | 2009-04-02 | 2010-10-12 | 삼성전자주식회사 | 무선통신시스템에서 핸드오버 레인징 메시지의 인증 처리 장치 및 방법 |
| US20110302416A1 (en) * | 2010-03-15 | 2011-12-08 | Bigband Networks Inc. | Method and system for secured communication in a non-ctms environment |
| US8625798B2 (en) * | 2011-01-10 | 2014-01-07 | Samsung Electronics Co., Ltd. | Method and apparatus for encrypting short data in a wireless communication system |
-
2012
- 2012-01-10 US US13/347,628 patent/US8625798B2/en active Active
- 2012-01-10 CN CN201280012112.8A patent/CN103430478B/zh active Active
- 2012-01-10 WO PCT/KR2012/000236 patent/WO2012096496A2/en not_active Ceased
- 2012-01-10 KR KR1020120002755A patent/KR101916034B1/ko active Active
- 2012-01-10 JP JP2013548363A patent/JP5855127B2/ja active Active
-
2014
- 2014-01-07 US US14/149,724 patent/US9088890B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US9088890B2 (en) | 2015-07-21 |
| JP2014508436A (ja) | 2014-04-03 |
| US8625798B2 (en) | 2014-01-07 |
| WO2012096496A3 (en) | 2012-12-06 |
| US20120177199A1 (en) | 2012-07-12 |
| KR20120081036A (ko) | 2012-07-18 |
| CN103430478A (zh) | 2013-12-04 |
| CN103430478B (zh) | 2016-08-24 |
| WO2012096496A2 (en) | 2012-07-19 |
| US20140126721A1 (en) | 2014-05-08 |
| KR101916034B1 (ko) | 2018-11-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5855127B2 (ja) | 無線通信システムにおける短文データの暗号化方法及び装置 | |
| US10638321B2 (en) | Wireless network connection method and apparatus, and storage medium | |
| CN113630773B (zh) | 安全实现方法、设备以及系统 | |
| ES2734989T3 (es) | Comunicaciones seguras para dispositivos informáticos que utilizan servicios de proximidad | |
| JP5479474B2 (ja) | 選択的な制御信号暗号化方法 | |
| KR101294816B1 (ko) | 제어신호 암호화 방법 | |
| CN1846398B (zh) | 基于成对主密钥的验证式密钥交换 | |
| CN101511084B (zh) | 一种移动通信系统的鉴权和密钥协商方法 | |
| US20090209232A1 (en) | Techniques for secure channelization between uicc and a terminal | |
| CN101512537A (zh) | 在自组无线网络中安全处理认证密钥资料的方法和系统 | |
| JP2011139457A (ja) | 無線通信装置とサーバとの間でデータを安全にトランザクション処理する方法及びシステム | |
| CN101500229A (zh) | 建立安全关联的方法和通信网络系统 | |
| CN117546441A (zh) | 一种安全通信方法及装置、终端设备、网络设备 | |
| CN112087724A (zh) | 一种通信方法、网络设备、用户设备和接入网设备 | |
| CN108012266A (zh) | 一种数据传输方法及相关设备 | |
| WO2014090130A1 (zh) | 报文处理方法及装置、系统 | |
| WO2022237561A1 (zh) | 一种通信方法及装置 | |
| Ouaissa et al. | New security level of authentication and key agreement protocol for the IoT on LTE mobile networks | |
| CN111615837B (zh) | 数据传输方法、相关设备以及系统 | |
| WO2018010186A1 (zh) | 密钥获取方法及装置 | |
| WO2022134089A1 (zh) | 一种安全上下文生成方法、装置及计算机可读存储介质 | |
| CN110495153A (zh) | 在预关联的状态中加密数据 | |
| WO2020147602A1 (zh) | 一种认证方法、装置和系统 | |
| WO2025139994A1 (zh) | 一种通信方法及装置 | |
| KR20100092353A (ko) | 트래픽 암호화 키 관리방법 및 장치 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20141208 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20141208 |
|
| RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20141226 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150707 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150717 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20151016 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20151109 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20151208 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5855127 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |