JP6023152B2 - ダイレクトリンク通信のための拡張されたセキュリティ - Google Patents
ダイレクトリンク通信のための拡張されたセキュリティ Download PDFInfo
- Publication number
- JP6023152B2 JP6023152B2 JP2014230900A JP2014230900A JP6023152B2 JP 6023152 B2 JP6023152 B2 JP 6023152B2 JP 2014230900 A JP2014230900 A JP 2014230900A JP 2014230900 A JP2014230900 A JP 2014230900A JP 6023152 B2 JP6023152 B2 JP 6023152B2
- Authority
- JP
- Japan
- Prior art keywords
- wtru
- nonce
- key
- processor
- gkek
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
- H04W92/18—Interfaces between hierarchically similar devices between terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Description
Claims (14)
- 第1の無線送受信ユニット(WTRU)と第2のWTRUとの間の安全なダイレクトリンク通信についてのWTRU認証のための方法であって、
前記第1のWTRUが、第1のナンスを生成するステップと、
前記第1のWTRUが、前記第1のナンスを、前記第2のWTRUに関連付けられた第2のナンスと交換するステップと、
前記第1のWTRUが、前記第2のWTRUによって生成されることが予定されている共通ナンスを生成するステップであって、前記共通ナンスは、前記交換された第1および第2のナンスから導出される、ステップと、
前記第1のWTRUが、認証エンティティに対してグループ識別情報要素(GIIE:group identification information element)を送信するステップであって、前記グループ識別情報要素は、少なくとも、前記第1のナンスと前記第2のナンスとの安全な組み合わせである共通ナンスを含む、ステップと、
前記第1のWTRUが、前記認証エンティティからマスター鍵を受信するステップであって、前記マスター鍵は、前記第1のWTRU専用に、安全に暗号化される、ステップと、
を含む方法。 - 前記第1のWTRUが、GKEK(group key encryption key)およびGKCK(group key confirmation key)を生成するステップをさらに含む、請求項1に記載の方法。
- 前記マスター鍵は、GKEKで暗号化されてGKCKにて署名されたマスター鍵であり、前記GKEKおよび前記GKCKは、前記GKEKで暗号化されてGKCKにて署名されたマスター鍵を解読するために使用される、請求項2に記載の方法。
- 前記第1のWTRUが、前記第2のWTRUとの通信について、GDLTK(group direct link temporal key)を生成するステップをさらに含む、請求項1に記載の方法。
- 前記第1のWTRUが、前記第2のWTRUとの通信の間、前記GDLTKをリフレッシュするステップをさらに含む、請求項4に記載の方法。
- 前記第1のWTRUが、前記GDLTKを用いて暗号化されたデータを前記第2のWTRUに直接送信するステップをさらに含む、請求項4に記載の方法。
- 前記マスター鍵は、前記共通ナンスから導出される、請求項1に記載の方法。
- 第1の無線送受信ユニット(WTRU)であって、
第1のナンスを生成するように構成されたプロセッサと、
第2のWTRUと、前記第1のナンスと前記第2のWTRUに関連付けられた第2のナンスとを交換するように構成された前記プロセッサに動作可能に接続された送受信機と、
前記第2のWTRUと関連付けられた第2のナンスを受信するようにさらに構成された前記送受信機および前記プロセッサと、
前記第2のWTRUによって生成されることが予定されている共通ナンスを生成するようにさらに構成された前記プロセッサであって、前記共通ナンスは、前記交換された第1および第2のナンスから導出される、前記プロセッサと、
認証サーバに対して、少なくとも前記共通ナンスを含むグループ識別情報を送信するようにさらに構成された前記送受信機および前記プロセッサと、
前記認証サーバからマスター鍵を受信するようにさらに構成された前記送受信機および前記プロセッサであって、前記マスター鍵は、前記第1のWTRU専用に、安全に暗号化される、前記送受信機および前記プロセッサと、
を備える、第1のWTRU。 - 前記プロセッサは、GKEK(group key encryption key)およびGKCK(group key confirmation key)を導出するようにさらに構成された、請求項8に記載の第1のWTRU。
- 前記プロセッサは、前記GKEKおよび前記GKCKを使用して、前記認証サーバから受信された前記GKEKで暗号化されてGKCKにて署名されたマスター鍵を解読するようにさらに構成された、請求項9に記載の第1のWTRU。
- 前記プロセッサは、前記第2のWTRUとの通信について、GDLTK(group direct link temporal key)を生成するようにさらに構成された、請求項8に記載の第1のWTRU。
- 前記プロセッサは、前記第2のWTRUとの通信の間、前記GDLTKをリフレッシュするようにさらに構成された、請求項11に記載の第1のWTRU。
- 前記送受信機は、前記GDLTKを用いて暗号化されたデータを前記第2のWTRUに直接送信するようにさらに構成された、請求項11に記載の第1のWTRU。
- 前記マスター鍵は、前記共通ナンスから導出される、請求項8に記載の第1のWTRU。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13832008P | 2008-12-17 | 2008-12-17 | |
US61/138,320 | 2008-12-17 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2013149446A Division JP5678138B2 (ja) | 2008-12-17 | 2013-07-18 | ダイレクトリンク通信のための拡張されたセキュリティ |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016198194A Division JP2017073777A (ja) | 2008-12-17 | 2016-10-06 | ダイレクトリンク通信のための拡張されたセキュリティ |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2015062301A JP2015062301A (ja) | 2015-04-02 |
JP6023152B2 true JP6023152B2 (ja) | 2016-11-09 |
Family
ID=42242001
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011542359A Expired - Fee Related JP5324665B2 (ja) | 2008-12-17 | 2009-12-16 | ダイレクトリンク通信のための拡張されたセキュリティ |
JP2013149446A Expired - Fee Related JP5678138B2 (ja) | 2008-12-17 | 2013-07-18 | ダイレクトリンク通信のための拡張されたセキュリティ |
JP2014230900A Expired - Fee Related JP6023152B2 (ja) | 2008-12-17 | 2014-11-13 | ダイレクトリンク通信のための拡張されたセキュリティ |
JP2016198194A Withdrawn JP2017073777A (ja) | 2008-12-17 | 2016-10-06 | ダイレクトリンク通信のための拡張されたセキュリティ |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011542359A Expired - Fee Related JP5324665B2 (ja) | 2008-12-17 | 2009-12-16 | ダイレクトリンク通信のための拡張されたセキュリティ |
JP2013149446A Expired - Fee Related JP5678138B2 (ja) | 2008-12-17 | 2013-07-18 | ダイレクトリンク通信のための拡張されたセキュリティ |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016198194A Withdrawn JP2017073777A (ja) | 2008-12-17 | 2016-10-06 | ダイレクトリンク通信のための拡張されたセキュリティ |
Country Status (7)
Country | Link |
---|---|
US (2) | US8892874B2 (ja) |
EP (1) | EP2386170A2 (ja) |
JP (4) | JP5324665B2 (ja) |
KR (4) | KR101688266B1 (ja) |
CN (2) | CN102257842B (ja) |
TW (3) | TWI551157B (ja) |
WO (1) | WO2010077910A2 (ja) |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8542620B2 (en) | 2009-05-05 | 2013-09-24 | Qualcomm Incorporated | Dynamic energy saving mechanism for access points |
US8965283B2 (en) * | 2009-08-10 | 2015-02-24 | Qualcomm Incorporated | Setting up a direct link in a peer to peer wireless network |
WO2011019175A2 (en) * | 2009-08-11 | 2011-02-17 | Lg Electronics Inc. | Apparatus and method for power save mode in wireless local area network |
US8576761B1 (en) | 2009-09-18 | 2013-11-05 | Qualcomm Incorporated | Power save delivery mechanism for wireless communication traffic |
GB201000448D0 (en) * | 2010-01-12 | 2010-02-24 | Cambridge Silicon Radio Ltd | Indirect pairing |
US8537733B1 (en) | 2010-02-12 | 2013-09-17 | Qualcomm Incorporated | Dynamic power mode switch in a wireless ad-hoc system |
US9311446B1 (en) | 2010-03-19 | 2016-04-12 | Qualcomm Incorporated | Multicast transmission for power management in an ad-hoc wireless system |
US8588156B1 (en) | 2010-04-27 | 2013-11-19 | Qualcomm Incorporated | Direct data communication in infrastructure mode in wireless communication systems |
US8526346B1 (en) | 2010-04-28 | 2013-09-03 | Qualcomm Incorporated | Power save communication mechanism for wireless communication systems |
US10721782B2 (en) * | 2010-09-02 | 2020-07-21 | Texas Instruments Incorporated | Power efficient tunneled direct link setup apparatus, systems and methods |
US9271136B2 (en) * | 2010-11-19 | 2016-02-23 | Qualcomm Incorporated | Probe messaging for direct link connections |
US10091636B2 (en) | 2010-11-19 | 2018-10-02 | Qualcomm Incorporated | Probe messaging for direct link connections |
US20120151089A1 (en) * | 2010-12-08 | 2012-06-14 | Atheros Communications, Inc. | Direct data communication in a peer-to-peer network |
JP5492134B2 (ja) * | 2011-04-01 | 2014-05-14 | 株式会社Nttドコモ | 移動通信方法、移動管理ノード及び無線基地局 |
US8611268B1 (en) | 2011-04-15 | 2013-12-17 | Qualcomm Incorporated | Access point power save mechanism for wireless communication systems |
US9635694B2 (en) * | 2011-07-25 | 2017-04-25 | Qualcomm Incorporated | Method and apparatus for tunneled direct link setup management |
US9210731B2 (en) | 2011-07-25 | 2015-12-08 | Qualcomm Incorporated | Direct link setup through an extended service set |
CN102938696B (zh) * | 2011-08-15 | 2015-08-12 | 国民技术股份有限公司 | 一种会话密钥的生成方法及模块 |
CN103179679A (zh) * | 2011-12-21 | 2013-06-26 | 国民技术股份有限公司 | 安全通道与开放通道绑定的方法 |
WO2013113368A1 (en) * | 2012-01-31 | 2013-08-08 | Nokia Siemens Networks Oy | Encrypting device-to-device messages for a public safety network mobile communication system |
US9049658B2 (en) | 2012-03-06 | 2015-06-02 | Qualcomm Incorporated | Power save mechanism for peer-to-peer communication networks |
GB2500720A (en) * | 2012-03-30 | 2013-10-02 | Nec Corp | Providing security information to establish secure communications over a device-to-device (D2D) communication link |
WO2013153232A2 (en) * | 2012-04-13 | 2013-10-17 | Anyfi Networks Ab | Moderation of network and access point selection in an ieee 802.11 communication system |
JP5306510B1 (ja) * | 2012-04-23 | 2013-10-02 | 株式会社東芝 | 電子機器、無線接続制御方法、無線接続制御プログラム |
TWI524807B (zh) * | 2012-05-07 | 2016-03-01 | 財團法人工業技術研究院 | 裝置間通訊的認證系統及認證方法 |
US9232391B2 (en) | 2012-05-07 | 2016-01-05 | Industrial Technology Research Institute | Authentication system for device-to-device communication and authentication method therefor |
BR112015004063B1 (pt) * | 2012-08-30 | 2022-11-29 | Koninklijke Philips N.V | Sistema para comunicação sem fio; dispositivo portátil para comunicação sem fio; dispositivo hospedeiro para comunicação sem fio; dispositivo sem fio para comunicação sem fio; método de comunicação sem fio em um sistema de dispositivos sem fio; e meio legível por computador não transitório |
CN104838681B (zh) * | 2012-10-11 | 2019-03-12 | 诺基亚通信公司 | 利用核心网络支持的伪基站检测 |
MY168771A (en) * | 2012-11-27 | 2018-12-04 | Mimos Berhad | A system and method for duty-shared authenticated group key transport |
US9094191B2 (en) * | 2013-03-14 | 2015-07-28 | Qualcomm Incorporated | Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks |
WO2014165747A1 (en) * | 2013-04-05 | 2014-10-09 | Interdigital Patent Holdings, Inc. | Securing peer-to-peer and group communications |
CN105359563A (zh) * | 2013-06-28 | 2016-02-24 | 日本电气株式会社 | 安全系统和进行安全通信的方法 |
WO2014208035A1 (en) | 2013-06-28 | 2014-12-31 | Nec Corporation | Security for prose group communication |
US9491621B2 (en) * | 2013-09-10 | 2016-11-08 | Qualcomm Incorporated | Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes |
US9510376B2 (en) | 2013-09-25 | 2016-11-29 | At&T Intellectual Property I, L.P. | Tunneling packet exchange in long term evolution protocol based networks |
CN105706390B (zh) * | 2013-10-30 | 2020-03-03 | 三星电子株式会社 | 在无线通信网络中执行设备到设备通信的方法和装置 |
EP2913955A1 (en) * | 2014-02-28 | 2015-09-02 | Gemalto SA | Method to authenticate two devices to establish a secure channel |
CN104010303B (zh) * | 2014-05-09 | 2016-09-14 | 中国人民解放军信息工程大学 | 基于物理层密钥的终端和核心网的双向认证增强方法 |
CN104010305B (zh) * | 2014-05-09 | 2016-10-12 | 中国人民解放军信息工程大学 | 基于物理层密钥的终端和接入网的双向认证增强方法 |
US20150381577A1 (en) * | 2014-06-30 | 2015-12-31 | Motorola Solutions, Llc. | System for, and method of, authenticating a supplicant, and distributing group keys to group members, in a multi-hop wireless communications network with enhanced security |
US9538563B2 (en) | 2014-10-13 | 2017-01-03 | At&T Intellectual Property I, L.P. | System and methods for managing a user data path |
US9585013B2 (en) * | 2014-10-29 | 2017-02-28 | Alcatel Lucent | Generation of multiple shared keys by user equipment and base station using key expansion multiplier |
US10075447B2 (en) * | 2015-03-04 | 2018-09-11 | Neone, Inc. | Secure distributed device-to-device network |
US9893894B2 (en) * | 2015-03-13 | 2018-02-13 | Intel IP Corporation | Systems, methods, and devices for secure device-to-device discovery and communication |
CN106330436A (zh) * | 2016-08-30 | 2017-01-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种通信的方法、安全终端及系统 |
JP6834771B2 (ja) * | 2017-05-19 | 2021-02-24 | 富士通株式会社 | 通信装置および通信方法 |
US10855440B1 (en) * | 2017-11-08 | 2020-12-01 | Wickr Inc. | Generating new encryption keys during a secure communication session |
FR3082382B1 (fr) * | 2018-06-12 | 2020-09-25 | Intesecc | Procede de communication securisee entre deux dispositifs electroniques, procede pour administrer une telle communication, objets electroniques mettant en oeuvre respectivement lesdits procedes et systeme associe |
US10820201B1 (en) * | 2019-05-17 | 2020-10-27 | Cisco Technology, Inc. | Providing secure access for automatically on-boarded subscribers in Wi-Fi networks |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1222014A (zh) * | 1997-10-03 | 1999-07-07 | 株式会社日立制作所 | 在保密广播通信中用于分配加密和解密密钥的方法和系统 |
US7428749B2 (en) * | 2001-08-03 | 2008-09-23 | International Business Machines Corporation | Secure delegation using public key authorization |
JP2003283489A (ja) | 2002-03-20 | 2003-10-03 | Hitachi Ltd | パケット認証システムおよび認証方法、ならびにグループ管理サーバとグループメンバー装置 |
FI114061B (fi) * | 2002-05-17 | 2004-07-30 | Nokia Corp | Menetelmä ja järjestelmä digitaalisessa langattomassa tiedonsiirtoverkossa datasalauksen järjestämiseksi ja vastaava palvelin |
CN1166124C (zh) * | 2002-09-16 | 2004-09-08 | 联想(北京)有限公司 | 家庭网络中实现动态组网时的设备对等连接方法 |
JP2004254027A (ja) * | 2003-02-19 | 2004-09-09 | Toshiba Corp | サーバ装置、鍵管理装置、暗号通信方法及びプログラム |
CN1301608C (zh) * | 2003-06-25 | 2007-02-21 | 神州亿品科技有限公司 | 中心认证的对等无线局域网的实现方法 |
JP2005223773A (ja) * | 2004-02-09 | 2005-08-18 | Hitachi Ltd | グループ内共通鍵の生成と共有方法およびその装置 |
US7724732B2 (en) * | 2005-03-04 | 2010-05-25 | Cisco Technology, Inc. | Secure multipoint internet protocol virtual private networks |
KR101248906B1 (ko) * | 2005-05-27 | 2013-03-28 | 삼성전자주식회사 | 무선 랜에서의 키 교환 방법 |
EP1900170B1 (en) * | 2005-06-29 | 2017-11-15 | Telecom Italia S.p.A. | Short authentication procedure in wireless data communications networks |
US20070097934A1 (en) * | 2005-11-03 | 2007-05-03 | Jesse Walker | Method and system of secured direct link set-up (DLS) for wireless networks |
US7676676B2 (en) * | 2005-11-14 | 2010-03-09 | Motorola, Inc. | Method and apparatus for performing mutual authentication within a network |
WO2007111710A2 (en) * | 2005-11-22 | 2007-10-04 | Motorola Inc. | Method and apparatus for providing a key for secure communications |
US20090063851A1 (en) * | 2006-03-20 | 2009-03-05 | Nijdam Mark J | Establishing communications |
US7675867B1 (en) * | 2006-04-19 | 2010-03-09 | Owl Computing Technologies, Inc. | One-way data transfer system with built-in data verification mechanism |
US7508788B2 (en) * | 2006-06-14 | 2009-03-24 | Toshiba America Research, Inc | Location dependent key management in sensor networks without using deployment knowledge |
ATE538581T1 (de) * | 2006-06-20 | 2012-01-15 | Ericsson Telefon Ab L M | Verfahren und anordnung zum sicherstellen von präfix-einheitlichkeit zwischen mehreren mobil- routern |
EP1965558B1 (en) * | 2007-03-01 | 2011-10-19 | Mitsubishi Electric Corporation | Method, apparatuses and computer program product for robust digest authentication using two types of nonce values |
US7720995B2 (en) * | 2007-06-08 | 2010-05-18 | Cisco Technology, Inc. | Conditional BGP advertising for dynamic group VPN (DGVPN) clients |
JP5102701B2 (ja) * | 2008-05-27 | 2012-12-19 | パナソニック株式会社 | 秘密鍵配布方法、秘密鍵配布システム |
-
2009
- 2009-12-16 KR KR1020137012414A patent/KR101688266B1/ko active IP Right Grant
- 2009-12-16 EP EP09795634A patent/EP2386170A2/en not_active Withdrawn
- 2009-12-16 CN CN200980151200.4A patent/CN102257842B/zh not_active Expired - Fee Related
- 2009-12-16 KR KR1020117016427A patent/KR101350538B1/ko not_active IP Right Cessation
- 2009-12-16 US US12/639,293 patent/US8892874B2/en not_active Expired - Fee Related
- 2009-12-16 KR KR1020157018438A patent/KR101669782B1/ko active IP Right Grant
- 2009-12-16 WO PCT/US2009/068177 patent/WO2010077910A2/en active Application Filing
- 2009-12-16 CN CN201410045568.5A patent/CN103781066B/zh not_active Expired - Fee Related
- 2009-12-16 KR KR1020167028948A patent/KR101761532B1/ko active IP Right Grant
- 2009-12-16 JP JP2011542359A patent/JP5324665B2/ja not_active Expired - Fee Related
- 2009-12-17 TW TW102122279A patent/TWI551157B/zh not_active IP Right Cessation
- 2009-12-17 TW TW098143336A patent/TWI441528B/zh not_active IP Right Cessation
- 2009-12-17 TW TW104141376A patent/TW201628422A/zh unknown
-
2013
- 2013-07-18 JP JP2013149446A patent/JP5678138B2/ja not_active Expired - Fee Related
-
2014
- 2014-11-13 JP JP2014230900A patent/JP6023152B2/ja not_active Expired - Fee Related
- 2014-11-17 US US14/543,344 patent/US9554270B2/en not_active Expired - Fee Related
-
2016
- 2016-10-06 JP JP2016198194A patent/JP2017073777A/ja not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
CN103781066A (zh) | 2014-05-07 |
US20100153727A1 (en) | 2010-06-17 |
KR101761532B1 (ko) | 2017-07-25 |
CN102257842A (zh) | 2011-11-23 |
CN103781066B (zh) | 2017-06-27 |
TWI441528B (zh) | 2014-06-11 |
KR20110104047A (ko) | 2011-09-21 |
JP2015062301A (ja) | 2015-04-02 |
JP2013225933A (ja) | 2013-10-31 |
JP5324665B2 (ja) | 2013-10-23 |
US20150074411A1 (en) | 2015-03-12 |
JP2017073777A (ja) | 2017-04-13 |
TWI551157B (zh) | 2016-09-21 |
KR101350538B1 (ko) | 2014-02-17 |
JP5678138B2 (ja) | 2015-02-25 |
CN102257842B (zh) | 2014-03-12 |
TW201101863A (en) | 2011-01-01 |
US9554270B2 (en) | 2017-01-24 |
WO2010077910A2 (en) | 2010-07-08 |
US8892874B2 (en) | 2014-11-18 |
TW201628422A (zh) | 2016-08-01 |
WO2010077910A3 (en) | 2010-12-02 |
JP2012512612A (ja) | 2012-05-31 |
KR20150087427A (ko) | 2015-07-29 |
TW201414329A (zh) | 2014-04-01 |
EP2386170A2 (en) | 2011-11-16 |
KR20160124248A (ko) | 2016-10-26 |
KR101669782B1 (ko) | 2016-11-09 |
KR20130079592A (ko) | 2013-07-10 |
KR101688266B1 (ko) | 2016-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6023152B2 (ja) | ダイレクトリンク通信のための拡張されたセキュリティ | |
JP6592578B2 (ja) | 基地局を自己構成する方法および装置 | |
JP2011139457A (ja) | 無線通信装置とサーバとの間でデータを安全にトランザクション処理する方法及びシステム | |
US20230014894A1 (en) | Quantum resistant secure key distribution in various protocols and technologies | |
KR20140066230A (ko) | 공유된 일시적 키 데이터의 세트를 갖는 교환들을 인코딩하기 위한 시스템들 및 방법들 | |
WO2019095990A1 (zh) | 一种通信方法及装置 | |
Rengaraju et al. | Analysis on mobile WiMAX security | |
Maccari et al. | Security analysis of IEEE 802.16 | |
Singh et al. | Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity | |
Dey et al. | An efficient dynamic key based eap authentication framework for future ieee 802.1 x wireless lans | |
WO2018126783A1 (zh) | 一种密钥传输方法及装置、计算机存储介质 | |
Nomula et al. | Multi-photon tolerant protocols for quantum secure communication in wireless standards | |
Kambourakis et al. | Key Management in 802.16 e |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20151125 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20151201 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20160301 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160601 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20160906 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20161006 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6023152 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
LAPS | Cancellation because of no payment of annual fees |