JP6492115B2 - 暗号鍵の生成 - Google Patents
暗号鍵の生成 Download PDFInfo
- Publication number
- JP6492115B2 JP6492115B2 JP2017065703A JP2017065703A JP6492115B2 JP 6492115 B2 JP6492115 B2 JP 6492115B2 JP 2017065703 A JP2017065703 A JP 2017065703A JP 2017065703 A JP2017065703 A JP 2017065703A JP 6492115 B2 JP6492115 B2 JP 6492115B2
- Authority
- JP
- Japan
- Prior art keywords
- key
- authentication
- sqn
- management entity
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Description
KASME=KDF(CK‖IK,0x02‖PMLN_ID‖<他のパラメータ>)
であり、ここで、KDFは汎用ブートストラッピング・アーキテクチャ(GBA)の鍵導出関数(KDF)に基づく。1つのGBA KDFは非特許文献3に規定される。
KDF(CK,IMPI)。
KDF(CK‖IK,IMPI)。
KDF(CK‖IK,RAND‖IMPI)。
トークン=AUTN=(SQN xOR AK)‖AMF‖MAC
または
トークン=function(AUTN)=function((SQN xOR AK)‖AMF‖MAC)
と表現されうる。
0x02‖PLMN_ID‖RAND‖IMPI‖トークン
と表現されうる。トークンがSQNそのものである場合に、上記は
0x02‖PLMN_ID‖RAND‖IMPI‖SQN
となり、トークンがAUTNである場合に、上記は
0x02‖PLMN_ID‖RAND‖IMPI‖AUTN
となる。
トークン=AUTN=(SQN xOR AK)‖AMF‖MAC
と表現されうる。
0x02‖PLMN_ID‖RAND‖IMPI‖トークン
と表現されうる。トークンがSQNである場合に、上記は
0x02‖PLMN_ID‖RAND‖IMPI‖SQN
となり、トークンがAUTNである場合に、上記は
0x02‖PLMN_ID‖RAND‖IMPI‖AUTN
となる。
‐メッセージ認証コードMAC=f1(SQN‖RAND‖AMF)、ここでf1はメッセージ認証関数、
‐期待応答XRES=f2(RAND)、ここでf2は(場合によっては切り落とされた(truncated))メッセージ認証関数、
‐秘匿鍵CK=f3(RAND)、ここでf3は鍵生成関数、
‐完全性鍵IK=f4(RAND)、ここでf4は鍵生成関数、
‐匿名鍵AK=f5(RAND)、ここでf5は鍵生成関数。
AUTN=(SQN xOR AK)‖AMF‖MAC
として、シーケンス番号SQNを備えるか、またはこのSQNから導出されることが見て取れる。ここで、AKは匿名鍵であり、上記の出力”f5”からミレナージュ(図9参照)によって作り出されうる。
KDF(CK‖IK,RAND‖IMPI‖SQN)
は上述の衝突問題への第1解決策である。ここで、SQNはこのように入力に含まれている。ここで、2つのRANDが同一、すなわちRAND=RAND´だとしても、SQNが常に(例えば1だけ)増加しているという事実は、入力が異なり、一意であり、または区別できることを保証するだろう。
KDF(CK‖IK,RAND‖IMPI‖AUTN)
を用いることである。この解決策は、AUTNがAKAシグナリングから「そのまま」用いられうるため、より単純に実装されうる。しかしながら、この場合の入力の「一意性」は明らかでないかもしれない。なぜなら、
AUTN=(SQN xOR AK)‖AMF‖MAC
であり、SQN≠SQN´だとしても、AKが場合によっては違いを「打ち消し」うるため、(SQN xOR AK)と(SQN´ xOR AK´)とが異なることはすぐには見て取れない。しかしながら、以下のように、(SQN xOR AK)が異なっていることが証明されうる。
が成り立つと想定する。これがCK=CK´、IK=IK´、およびRAND=RAND´を暗示することがすでに示されている。よって、AUTN=AUTN´が成り立ちうるかどうかを調べることが残っている。これを調べることは、
(SQN xOR AK)‖AMF‖MAC=(SQN´ xOR AK´)‖AMF´‖MAC´
が成り立つかどうかを調べることに置き換えうる。
SQN xOR AK = SQN´ xOR AK´
が成り立ちうるかどうかを調べることだけが必要になる。
SQN=SQN´
となるべきであるが、これは矛盾する。なぜなら、前述のように、SQNは常に「ステップアップ」し、よってSQN≠SQN´であるからである。
Claims (5)
- ユーザ機器とモビリティ管理エンティティ(204)との間の通信を保護するためのアクセス・セキュリティ管理エンティティ鍵K ASME を生成するための方法であって、前記方法は前記モビリティ管理エンティティ(204)により開始されるAKAプロトコルに基づく認証/暗号鍵配送手続きの一部として前記ユーザ機器により実行され、
前記認証/暗号鍵配送手続きを実行することによって前記ユーザ機器により算出された暗号鍵の集合を備えるか又は前記集合から導出される第1パラメータ(106)と、トークン(116)から導出される第2パラメータ(108)とを含む少なくとも2つのパラメータを提供する工程(306)と、
前記提供されたパラメータ(106,108)に基づいて前記アクセス・セキュリティ管理エンティティ鍵KASMEを生成するために鍵導出関数を適用する工程(308)であって、前記トークン(116)はシーケンス番号<SQN>と匿名鍵<AK>との排他的論理和を備え、前記暗号鍵の集合はUMTS認証/暗号鍵配送<AKA>プロトコルに準拠する乱数チャレンジを用いて鍵生成関数f3によって生み出された秘匿鍵<CK>(110)及びUMTS AKAプロトコルに準拠する乱数チャレンジを用いて鍵生成関数f4によって生み出された完全性鍵<IK>(112)を備える、工程(308)と、
前記生成されたアクセス・セキュリティ管理エンティティ鍵KASMEに基づいてノンアクセスストラタムトラフィックを保護するための暗号鍵K NASenc を生成するために更なる鍵導出関数を適用する工程と
を有することを特徴とする方法。 - 前記認証/暗号鍵配送手続きは前記ユーザ機器と前記モビリティ管理エンティティ(204)とにより連携して実行されることを特徴とする請求項1に記載の方法。
- 請求項1又は2に記載の方法の各工程をユーザ機器に実行させるためのコンピュータプログラム。
- モビリティ管理エンティティ(204)により開始されるAKAプロトコルに基づく認証/暗号鍵配送手続きを実行するように構成されたユーザ機器のためにアクセス・セキュリティ管理エンティティ鍵K ASME を生成するように構成された装置(100)であって、
前記認証/暗号鍵配送手続きを実行することによって前記ユーザ機器により算出された暗号鍵の集合を備えるか又は前記集合から導出される第1パラメータ(106)と、トークン(116)から導出される第2パラメータ(108)とを含む少なくとも2つのパラメータを提供するように構成された第1コンポーネント(102)と、
前記提供されたパラメータ(106,108)に基づいて前記アクセス・セキュリティ管理エンティティ鍵KASMEを生成するために鍵導出関数を適用するように構成された第2コンポーネント(104)と
を備え、
前記トークン(116)はシーケンス番号<SQN>と匿名鍵<AK>との排他的論理和を備え、
前記暗号鍵の集合はUMTS認証/暗号鍵配送<AKA>プロトコルに準拠する乱数チャレンジを用いて鍵生成関数f3によって生み出された秘匿鍵<CK>(110)及びUMTS AKAプロトコルに準拠する乱数チャレンジを用いて鍵生成関数f4によって生み出された完全性鍵<IK>(112)を備え、
前記装置は、前記生成されたアクセス・セキュリティ管理エンティティ鍵KASMEに基づいてノンアクセスストラタムトラフィックを保護するための暗号鍵K NASenc を生成するために更なる鍵導出関数を適用するようにさらに構成されることを特徴とする装置(100)。 - 請求項4に記載の装置(100)を備えることを特徴とするユーザ機器。
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US5938608P | 2008-06-06 | 2008-06-06 | |
| US61/059,386 | 2008-06-06 |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015241380A Division JP6121512B2 (ja) | 2008-06-06 | 2015-12-10 | 暗号鍵の生成 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2017175624A JP2017175624A (ja) | 2017-09-28 |
| JP6492115B2 true JP6492115B2 (ja) | 2019-03-27 |
Family
ID=40527985
Family Applications (5)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2011511982A Active JP4792135B2 (ja) | 2008-06-06 | 2008-07-21 | 暗号鍵の生成 |
| JP2011161346A Pending JP2011254512A (ja) | 2008-06-06 | 2011-07-22 | 暗号鍵の生成 |
| JP2013252327A Pending JP2014078985A (ja) | 2008-06-06 | 2013-12-05 | 暗号鍵の生成 |
| JP2015241380A Expired - Fee Related JP6121512B2 (ja) | 2008-06-06 | 2015-12-10 | 暗号鍵の生成 |
| JP2017065703A Active JP6492115B2 (ja) | 2008-06-06 | 2017-03-29 | 暗号鍵の生成 |
Family Applications Before (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2011511982A Active JP4792135B2 (ja) | 2008-06-06 | 2008-07-21 | 暗号鍵の生成 |
| JP2011161346A Pending JP2011254512A (ja) | 2008-06-06 | 2011-07-22 | 暗号鍵の生成 |
| JP2013252327A Pending JP2014078985A (ja) | 2008-06-06 | 2013-12-05 | 暗号鍵の生成 |
| JP2015241380A Expired - Fee Related JP6121512B2 (ja) | 2008-06-06 | 2015-12-10 | 暗号鍵の生成 |
Country Status (20)
| Country | Link |
|---|---|
| US (3) | US8340288B2 (ja) |
| EP (4) | EP2291946B2 (ja) |
| JP (5) | JP4792135B2 (ja) |
| KR (1) | KR101274392B1 (ja) |
| CN (2) | CN103746794B (ja) |
| AU (1) | AU2008357317B2 (ja) |
| BR (1) | BRPI0822761B1 (ja) |
| CA (1) | CA2722186C (ja) |
| CL (1) | CL2009001359A1 (ja) |
| DK (2) | DK2528268T6 (ja) |
| ES (3) | ES2637313T7 (ja) |
| IL (1) | IL209799A (ja) |
| MA (1) | MA32613B1 (ja) |
| MX (1) | MX2010012033A (ja) |
| MY (1) | MY146687A (ja) |
| NZ (1) | NZ589294A (ja) |
| PL (3) | PL2658163T6 (ja) |
| RU (1) | RU2480925C2 (ja) |
| WO (1) | WO2009146729A1 (ja) |
| ZA (1) | ZA201008200B (ja) |
Families Citing this family (53)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8079071B2 (en) * | 2006-11-14 | 2011-12-13 | SanDisk Technologies, Inc. | Methods for accessing content based on a session ticket |
| US20080114772A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Method for connecting to a network location associated with content |
| US8327454B2 (en) * | 2006-11-14 | 2012-12-04 | Sandisk Technologies Inc. | Method for allowing multiple users to access preview content |
| US20080114693A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Method for allowing content protected by a first DRM system to be accessed by a second DRM system |
| US20080112562A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Methods for linking content with license |
| US8763110B2 (en) * | 2006-11-14 | 2014-06-24 | Sandisk Technologies Inc. | Apparatuses for binding content to a separate memory device |
| EP2177074B1 (en) * | 2007-08-15 | 2017-10-04 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for early ims security |
| US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| CN101616408B (zh) * | 2008-06-23 | 2012-04-18 | 华为技术有限公司 | 密钥衍生方法、设备及系统 |
| GB0822599D0 (en) * | 2008-12-11 | 2009-01-21 | Vodafone Plc | Securing network rejection |
| US8296836B2 (en) * | 2010-01-06 | 2012-10-23 | Alcatel Lucent | Secure multi-user identity module key exchange |
| US9215220B2 (en) * | 2010-06-21 | 2015-12-15 | Nokia Solutions And Networks Oy | Remote verification of attributes in a communication network |
| US20120142315A1 (en) * | 2010-12-06 | 2012-06-07 | Jong-Moon Chung | Method for authentication and key establishment in a mobile communication system and method of operating a mobile station and a visitor location register |
| US8943318B2 (en) | 2012-05-11 | 2015-01-27 | Verizon Patent And Licensing Inc. | Secure messaging by key generation information transfer |
| US9154527B2 (en) | 2011-06-30 | 2015-10-06 | Verizon Patent And Licensing Inc. | Security key creation |
| US8990554B2 (en) | 2011-06-30 | 2015-03-24 | Verizon Patent And Licensing Inc. | Network optimization for secure connection establishment or secure messaging |
| US9270453B2 (en) | 2011-06-30 | 2016-02-23 | Verizon Patent And Licensing Inc. | Local security key generation |
| EP2730048A2 (en) * | 2011-07-07 | 2014-05-14 | Verayo, Inc. | Cryptographic security using fuzzy credentials for device and server communications |
| US8892865B1 (en) | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
| US9215076B1 (en) | 2012-03-27 | 2015-12-15 | Amazon Technologies, Inc. | Key generation for hierarchical data access |
| CN103906053B (zh) | 2012-12-28 | 2019-09-10 | 北京三星通信技术研究有限公司 | 配置和传输加密密匙的方法 |
| CN104919834B (zh) * | 2013-01-11 | 2018-10-19 | Lg 电子株式会社 | 用于在无线通信系统中应用安全信息的方法和设备 |
| EP3018850B1 (en) | 2013-01-30 | 2017-05-10 | Telefonaktiebolaget LM Ericsson (publ) | Security key generation for dual connectivity |
| JP2014192612A (ja) | 2013-03-26 | 2014-10-06 | Toshiba Corp | 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法およびプログラム |
| GB2518254B (en) * | 2013-09-13 | 2020-12-16 | Vodafone Ip Licensing Ltd | Communicating with a machine to machine device |
| FR3018371B1 (fr) * | 2014-03-10 | 2016-05-06 | Commissariat Energie Atomique | Procede et systeme de chiffrement/dechiffrement de donnees a cle distante et verification prealable de jeton |
| US10390224B2 (en) | 2014-05-20 | 2019-08-20 | Nokia Technologies Oy | Exception handling in cellular authentication |
| EP3146740B1 (en) * | 2014-05-20 | 2021-04-14 | Nokia Technologies Oy | Cellular network authentication |
| FR3022053B1 (fr) * | 2014-06-06 | 2018-02-02 | Oberthur Technologies | Procede d'authentification d'une premiere entite electronique par une seconde entite electronique et entite electronique mettant en œuvre un tel procede |
| JPWO2016132719A1 (ja) | 2015-02-16 | 2017-12-28 | 日本電気株式会社 | 通信システム、ノード装置、通信端末、及びキー管理方法 |
| KR101675088B1 (ko) * | 2015-04-30 | 2016-11-10 | 성균관대학교산학협력단 | Mtc에서의 네트워크와의 상호 인증 방법 및 시스템 |
| US10931644B2 (en) | 2015-06-23 | 2021-02-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity |
| EP3446518B1 (en) * | 2016-04-19 | 2022-01-05 | Nokia Solutions and Networks Oy | Network authorization assistance |
| MX392629B (es) * | 2016-07-07 | 2025-03-21 | Nokia Solutions & Networks Oy | Comunicacion de tipo maquina usando servicio de mensajeria corta de origen movil sin numero de directorio de abonados internacional de estacion movil |
| EP3472779A4 (en) * | 2016-07-14 | 2020-01-08 | Digital Asset Holdings, LLC | DIGITAL ASSETS PLATFORM |
| EP3471365A4 (en) * | 2016-07-15 | 2019-06-19 | Huawei Technologies Co., Ltd. | METHOD AND DEVICE FOR KEY RECORDING |
| EP3285512A1 (en) | 2016-08-17 | 2018-02-21 | Gemalto Sa | Authentication server of a cellular telecommunication network and corresponding uicc |
| CN106789057B (zh) * | 2016-11-28 | 2020-05-22 | 航天恒星科技有限公司 | 卫星通信协议下的密钥协商方法及系统 |
| KR102549946B1 (ko) * | 2017-01-09 | 2023-06-30 | 삼성전자주식회사 | 이동통신 환경에서 단말의 초기 접속 요청 메시지를 라우팅하는 방법 및 관련 파라미터 |
| JP6441390B2 (ja) * | 2017-01-26 | 2018-12-19 | 株式会社東芝 | 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法およびプログラム |
| RU2733828C1 (ru) | 2017-04-11 | 2020-10-07 | Хуавей Текнолоджиз Ко., Лтд. | Способ, устройство и система для сетевой аутентификации |
| BR112019027712A2 (pt) * | 2017-06-23 | 2020-07-28 | Motorola Mobility Llc | método e aparelho para implementar alterações específicas de portadora como parte de uma reconfiguração de conexão que afeta as chaves de segurança sendo usadas |
| DE112018003506T5 (de) * | 2017-08-29 | 2020-04-02 | Robert Bosch Gmbh | Verfahren und Systeme zur linearen Schlüsselvereinbarung mit Forward Secrecy unter Verwendung eines unsicheren gemeinsam genutzten Kommunikationsmediums |
| KR101835076B1 (ko) * | 2017-11-15 | 2018-04-19 | 곽권섭 | 보안강화 eps-aka 프로토콜을 이용한 이동통신 가입자 인증 방법 |
| DE102018133605B4 (de) * | 2018-12-27 | 2023-03-02 | Bachmann Gmbh | Verfahren und Vorrichtung zur Prüfung der Integrität von Modulen einer Windkraftanlage |
| US12081972B2 (en) * | 2019-01-18 | 2024-09-03 | Qualcomm Incorporated | Protection of sequence numbers in authentication and key agreement protocol |
| EP3720039B1 (de) * | 2019-04-05 | 2024-09-04 | Siemens Aktiengesellschaft | Verfahren für das konfigurieren eines sicherheitsmoduls mit mindestens einem abgeleiteten schlüssel |
| CN111628985A (zh) * | 2020-05-22 | 2020-09-04 | 深圳市有方科技股份有限公司 | 安全访问控制方法、装置、计算机设备和存储介质 |
| US12120225B2 (en) * | 2020-09-25 | 2024-10-15 | Renesas Electronics Corporation | Secure key generation and management in open and secure processor environments |
| US11924350B2 (en) | 2021-07-29 | 2024-03-05 | Digital Asset (Switzerland) GmbH | Cryptographically enforced partial blinding for distributed system |
| US11647392B1 (en) | 2021-12-16 | 2023-05-09 | Bank Of America Corporation | Systems and methods for context-aware mobile application session protection |
| CN115021913B (zh) * | 2022-06-14 | 2024-05-31 | 中国信息通信研究院 | 工业互联网标识解析体系密钥生成方法、系统与存储介质 |
| JP2024155131A (ja) * | 2023-04-20 | 2024-10-31 | キオクシア株式会社 | 情報処理システム |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7131006B1 (en) * | 1999-11-15 | 2006-10-31 | Verizon Laboratories Inc. | Cryptographic techniques for a communications network |
| GB0004178D0 (en) * | 2000-02-22 | 2000-04-12 | Nokia Networks Oy | Integrity check in a communication system |
| US20030053629A1 (en) * | 2001-09-14 | 2003-03-20 | Koninklijke Philips Electronics N.V. | USB authentication interface |
| DE10307403B4 (de) * | 2003-02-20 | 2008-01-24 | Siemens Ag | Verfahren zum Bilden und Verteilen kryptographischer Schlüssel in einem Mobilfunksystem und Mobilfunksystem |
| PL2357858T6 (pl) * | 2003-09-26 | 2018-11-30 | Telefonaktiebolaget L M Ericsson (Publ) | Udoskonalony model zabezpieczeń dla kryptografii w systemach komunikacji ruchomej |
| GB2407236B (en) * | 2003-10-17 | 2006-04-05 | Toshiba Res Europ Ltd | Methods and apparatus for secure data communication links |
| EP1626598A1 (en) * | 2004-06-21 | 2006-02-15 | Axalto SA | Method for securing an authentication and key agreement protocol |
| US7461268B2 (en) * | 2004-07-15 | 2008-12-02 | International Business Machines Corporation | E-fuses for storing security version data |
| US20060046690A1 (en) | 2004-09-02 | 2006-03-02 | Rose Gregory G | Pseudo-secret key generation in a communications system |
| US20060236116A1 (en) * | 2005-04-18 | 2006-10-19 | Lucent Technologies, Inc. | Provisioning root keys |
| US7558957B2 (en) * | 2005-04-18 | 2009-07-07 | Alcatel-Lucent Usa Inc. | Providing fresh session keys |
| WO2007062689A1 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for distributing keying information |
| WO2007085779A1 (en) * | 2006-01-24 | 2007-08-02 | British Telecommunications Public Limited Company | Method and system for recursive authentication in a mobile network |
| US20070271458A1 (en) * | 2006-05-22 | 2007-11-22 | Peter Bosch | Authenticating a tamper-resistant module in a base station router |
| JP5060081B2 (ja) | 2006-08-09 | 2012-10-31 | 富士通株式会社 | フレームを暗号化して中継する中継装置 |
| CN101536397B (zh) * | 2006-11-01 | 2012-01-11 | Lm爱立信电话有限公司 | 电信系统以及这种系统中控制消息的加密 |
| JP5396300B2 (ja) * | 2010-02-08 | 2014-01-22 | オルガノ株式会社 | 電気式脱イオン水製造装置 |
-
2008
- 2008-07-21 NZ NZ589294A patent/NZ589294A/en unknown
- 2008-07-21 AU AU2008357317A patent/AU2008357317B2/en active Active
- 2008-07-21 CA CA2722186A patent/CA2722186C/en active Active
- 2008-07-21 BR BRPI0822761-6A patent/BRPI0822761B1/pt active IP Right Grant
- 2008-07-21 ES ES12005934T patent/ES2637313T7/es active Active
- 2008-07-21 US US12/996,214 patent/US8340288B2/en active Active
- 2008-07-21 EP EP08784926.1A patent/EP2291946B2/en active Active
- 2008-07-21 CN CN201310606861.XA patent/CN103746794B/zh active Active
- 2008-07-21 WO PCT/EP2008/005960 patent/WO2009146729A1/en not_active Ceased
- 2008-07-21 ES ES08784926T patent/ES2400020T5/es active Active
- 2008-07-21 PL PL13003646T patent/PL2658163T6/pl unknown
- 2008-07-21 ES ES13003646T patent/ES2617067T7/es active Active
- 2008-07-21 EP EP12005934.0A patent/EP2528268B3/en active Active
- 2008-07-21 PL PL08784926T patent/PL2291946T5/pl unknown
- 2008-07-21 MX MX2010012033A patent/MX2010012033A/es active IP Right Grant
- 2008-07-21 PL PL12005934T patent/PL2528268T6/pl unknown
- 2008-07-21 DK DK12005934.0T patent/DK2528268T6/da active
- 2008-07-21 KR KR1020117000216A patent/KR101274392B1/ko active Active
- 2008-07-21 EP EP13003646.0A patent/EP2658163B3/en active Active
- 2008-07-21 EP EP17166183.8A patent/EP3242436A1/en not_active Withdrawn
- 2008-07-21 CN CN2008801296369A patent/CN102057617B/zh active Active
- 2008-07-21 RU RU2010149890/08A patent/RU2480925C2/ru active
- 2008-07-21 JP JP2011511982A patent/JP4792135B2/ja active Active
- 2008-07-21 MY MYPI2010005654A patent/MY146687A/en unknown
- 2008-07-21 DK DK08784926.1T patent/DK2291946T4/da active
-
2009
- 2009-06-04 CL CL2009001359A patent/CL2009001359A1/es unknown
-
2010
- 2010-11-16 ZA ZA2010/08200A patent/ZA201008200B/en unknown
- 2010-12-06 IL IL209799A patent/IL209799A/en active IP Right Grant
-
2011
- 2011-03-07 MA MA33674A patent/MA32613B1/fr unknown
- 2011-07-22 JP JP2011161346A patent/JP2011254512A/ja active Pending
-
2012
- 2012-11-12 US US13/674,226 patent/US8953793B2/en active Active
-
2013
- 2013-12-05 JP JP2013252327A patent/JP2014078985A/ja active Pending
-
2014
- 2014-08-01 US US14/449,219 patent/US9326142B2/en active Active
-
2015
- 2015-12-10 JP JP2015241380A patent/JP6121512B2/ja not_active Expired - Fee Related
-
2017
- 2017-03-29 JP JP2017065703A patent/JP6492115B2/ja active Active
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6492115B2 (ja) | 暗号鍵の生成 | |
| EP3605942B1 (en) | Key agreement for wireless communication | |
| Saxena et al. | Authentication protocol for an IoT-enabled LTE network | |
| Ouaissa et al. | New security level of authentication and key agreement protocol for the IoT on LTE mobile networks | |
| HK40023059B (en) | Key agreement for wireless communication | |
| HK40023059A (en) | Key agreement for wireless communication | |
| HK1151907A (en) | Cryptographic key generation | |
| Choudhury | Relaxing trust requirement in 3GPP mobile systems for improved subscriber identity privacy | |
| HK1247477B (en) | Key agreement for wireless communication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20180208 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180223 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180523 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20181005 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190109 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20190118 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20190204 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20190304 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6492115 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |