KR101240069B1 - 키 재료 생성 방법 - Google Patents

키 재료 생성 방법 Download PDF

Info

Publication number
KR101240069B1
KR101240069B1 KR1020077023862A KR20077023862A KR101240069B1 KR 101240069 B1 KR101240069 B1 KR 101240069B1 KR 1020077023862 A KR1020077023862 A KR 1020077023862A KR 20077023862 A KR20077023862 A KR 20077023862A KR 101240069 B1 KR101240069 B1 KR 101240069B1
Authority
KR
South Korea
Prior art keywords
key material
random number
network application
application function
user equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
KR1020077023862A
Other languages
English (en)
Korean (ko)
Other versions
KR20070122491A (ko
Inventor
사바 파텔
Original Assignee
알카텔-루센트 유에스에이 인코포레이티드
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 알카텔-루센트 유에스에이 인코포레이티드 filed Critical 알카텔-루센트 유에스에이 인코포레이티드
Publication of KR20070122491A publication Critical patent/KR20070122491A/ko
Application granted granted Critical
Publication of KR101240069B1 publication Critical patent/KR101240069B1/ko
Assigned to 크레디트 스위스 아게 reassignment 크레디트 스위스 아게 질권설정등록 Assignors: 알카텔-루센트 유에스에이 인코포레이티드
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
KR1020077023862A 2005-04-18 2006-04-10 키 재료 생성 방법 Expired - Fee Related KR101240069B1 (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/108,610 2005-04-18
US11/108,610 US7558957B2 (en) 2005-04-18 2005-04-18 Providing fresh session keys
PCT/US2006/013283 WO2006113206A1 (en) 2005-04-18 2006-04-10 Providing fresh session keys

Publications (2)

Publication Number Publication Date
KR20070122491A KR20070122491A (ko) 2007-12-31
KR101240069B1 true KR101240069B1 (ko) 2013-03-06

Family

ID=36678567

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020077023862A Expired - Fee Related KR101240069B1 (ko) 2005-04-18 2006-04-10 키 재료 생성 방법

Country Status (6)

Country Link
US (1) US7558957B2 (https=)
EP (1) EP1872513B1 (https=)
JP (1) JP5080449B2 (https=)
KR (1) KR101240069B1 (https=)
CN (1) CN101160779B (https=)
WO (1) WO2006113206A1 (https=)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8046824B2 (en) * 2005-04-11 2011-10-25 Nokia Corporation Generic key-decision mechanism for GAA
JP4741664B2 (ja) * 2005-07-07 2011-08-03 テレフオンアクチーボラゲット エル エム エリクソン(パブル) 認証及びプライバシーに対する方法及び装置
US7835528B2 (en) * 2005-09-26 2010-11-16 Nokia Corporation Method and apparatus for refreshing keys within a bootstrapping architecture
CN101039181B (zh) 2006-03-14 2010-09-08 华为技术有限公司 防止通用鉴权框架中服务功能实体受攻击的方法
US8407482B2 (en) * 2006-03-31 2013-03-26 Avaya Inc. User session dependent URL masking
DE102006054091B4 (de) * 2006-11-16 2008-09-11 Siemens Ag Bootstrapping-Verfahren
DE102007023206B4 (de) * 2006-11-18 2008-10-09 Dica Technologies Gmbh Verfahren und Einrichtung zur sicheren Erzeugung und Verwaltung von Schlüsseln und deren Nutzung in Netzwerken zur sicheren Übertragung von Daten
KR101447726B1 (ko) * 2006-12-08 2014-10-07 한국전자통신연구원 이동통신시스템에서의 인증키 생성 방법 및 갱신 방법
KR20100044199A (ko) * 2007-07-04 2010-04-29 코닌클리즈케 필립스 일렉트로닉스 엔.브이. 트러스트 센터 링크 키를 초기화하는 네트워크 및 방법
CN101163010B (zh) * 2007-11-14 2010-12-08 华为软件技术有限公司 对请求消息的鉴权方法和相关设备
WO2009070075A1 (en) * 2007-11-30 2009-06-04 Telefonaktiebolaget Lm Ericsson (Publ) Key management for secure communication
ES2687238T3 (es) * 2008-02-25 2018-10-24 Nokia Solutions And Networks Oy Método de arquitectura de arranque de seguro basado en autenticación de resumen basada en contraseña
US20090287929A1 (en) * 2008-05-15 2009-11-19 Lucent Technologies Inc. Method and apparatus for two-factor key exchange protocol resilient to password mistyping
BRPI0822761B1 (pt) * 2008-06-06 2020-09-29 Telefonaktiebolaget Lm Ericsson (Publ) Método para gerar uma chave criptográfica para proteger comunicação entre duas entidades, meio de armazenamento legível por computador, dispositivo adaptado para gerar uma chave criptográfica para uma entidade de comunicações, equipamento de usuário, e, sistema
CN101784048B (zh) * 2009-01-21 2014-01-01 中兴通讯股份有限公司 动态更新密钥的身份认证和密钥协商方法及系统
WO2011048551A1 (en) * 2009-10-19 2011-04-28 Nokia Corporation User identity management for permitting interworking of a bootstrapping architecture and a shared identity service
EP2695410B1 (en) * 2011-04-01 2017-04-19 Telefonaktiebolaget LM Ericsson (publ) Methods and apparatuses for avoiding damage in network attacks
MX2014005223A (es) * 2011-10-31 2014-09-01 Nokia Corp Mecanismo de seguridad para codigo externo.
US10631162B2 (en) 2013-10-30 2020-04-21 Samsung Electronics Co., Ltd. Method and apparatus to perform device to device communication in wireless communication network
WO2015166099A1 (en) * 2014-05-02 2015-11-05 Koninklijke Kpn N.V. Method and system for providing security from a radio access network
US10678927B2 (en) * 2017-08-31 2020-06-09 Texas Instruments Incorporated Randomized execution countermeasures against fault injection attacks during boot of an embedded device
EP3718330B1 (en) * 2017-11-29 2024-09-25 Telefonaktiebolaget LM Ericsson (publ) Session key establishment
US11089480B2 (en) * 2018-11-30 2021-08-10 Apple Inc. Provisioning electronic subscriber identity modules to mobile wireless devices
US20220086632A1 (en) * 2019-01-14 2022-03-17 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for security
CN112054906B (zh) * 2020-08-21 2022-02-11 郑州信大捷安信息技术股份有限公司 一种密钥协商方法及系统
US12500744B2 (en) * 2021-09-17 2025-12-16 Qualcomm Incorporated Securing application communication
WO2023043724A1 (en) * 2021-09-17 2023-03-23 Qualcomm Incorporated Securing application communication

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004034213A2 (en) 2002-10-08 2004-04-22 Koolspan Localized network authentication and security using tamper-resistant keys

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0722596A4 (en) * 1991-11-12 1997-03-05 Security Domain Pty Ltd METHOD AND SYSTEM FOR SECURE, DECENTRALIZED PERSONALIZATION OF CHIP CARDS
US6151676A (en) * 1997-12-24 2000-11-21 Philips Electronics North America Corporation Administration and utilization of secret fresh random numbers in a networked environment
CN1332919A (zh) * 1998-10-30 2002-01-23 塞特科公司 在分布加密中采用共享的随机性
SE517116C2 (sv) * 2000-08-11 2002-04-16 Ericsson Telefon Ab L M Metod och anordning för säkra kommunikationstjänster
JP2002344438A (ja) * 2001-05-14 2002-11-29 Nippon Telegr & Teleph Corp <Ntt> 鍵共有システム及び装置並びにプログラム
US8140845B2 (en) * 2001-09-13 2012-03-20 Alcatel Lucent Scheme for authentication and dynamic key exchange
US20030093663A1 (en) * 2001-11-09 2003-05-15 Walker Jesse R. Technique to bootstrap cryptographic keys between devices
CA2597475C (en) * 2005-02-04 2012-09-18 Qualcomm Incorporated Secure bootstrapping for wireless communications

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004034213A2 (en) 2002-10-08 2004-04-22 Koolspan Localized network authentication and security using tamper-resistant keys

Also Published As

Publication number Publication date
JP2008537445A (ja) 2008-09-11
JP5080449B2 (ja) 2012-11-21
US20060236106A1 (en) 2006-10-19
CN101160779A (zh) 2008-04-09
EP1872513A1 (en) 2008-01-02
KR20070122491A (ko) 2007-12-31
WO2006113206A1 (en) 2006-10-26
CN101160779B (zh) 2013-04-03
EP1872513B1 (en) 2018-01-10
US7558957B2 (en) 2009-07-07
WO2006113206B1 (en) 2007-01-18

Similar Documents

Publication Publication Date Title
KR101240069B1 (ko) 키 재료 생성 방법
KR101266773B1 (ko) 통신 방법
US10187373B1 (en) Hierarchical, deterministic, one-time login tokens
JP4965671B2 (ja) 無線通信ネットワークにおけるユーザ・プロファイル、ポリシー及びpmipキーの配布
US20060236116A1 (en) Provisioning root keys
CN110868294B (zh) 一种密钥更新方法、装置及设备
WO2010023506A1 (en) Methods, apparatuses, computer program products, and systems for providing secure pairing and association for wireless devices
CN105187369A (zh) 一种数据访问方法及装置
Zhang et al. PUF-based lightweight group authentication for massive IoT access with insecure channel
CN101039181B (zh) 防止通用鉴权框架中服务功能实体受攻击的方法
CN121217428A (zh) 安全通信方法、装置、设备及存储介质
US20060034462A1 (en) Method of generating key for device authentication and apparatus using the method, and device authentication method and device authentication apparatus
WO2019024937A1 (zh) 密钥协商方法、装置及系统
CN118101340B (zh) 数据安全传输方法、装置和电子设备
CN116886391A (zh) 物联网设备认证方法及装置、存储介质及电子设备
CN118474738A (zh) 认证方法、装置、相关设备及存储介质
CN111404669B (zh) 一种密钥生成方法、终端设备及网络设备
Alezabi et al. On the authentication and re‐authentication protocols in LTE‐WLAN interworking architecture
Xie et al. A practical anonymous authentication protocol for wireless roaming
WO2022178890A1 (zh) 一种密钥的传输方法和装置
CN116097690A (zh) 一种通用引导架构中的方法及相关装置
WO2024260335A1 (zh) 数据处理方法、装置、计算机设备及存储介质
CN115941283A (zh) 一种基于z算法实例扩展属性的离线z算法资源异步更新方法
CN121396537A (zh) 匿名认证方法、装置、系统、设备、存储介质和程序产品
CN119653357A (zh) 加密数据的传输方法、装置及系统

Legal Events

Date Code Title Description
PA0105 International application

St.27 status event code: A-0-1-A10-A15-nap-PA0105

PG1501 Laying open of application

St.27 status event code: A-1-1-Q10-Q12-nap-PG1501

R18-X000 Changes to party contact information recorded

St.27 status event code: A-3-3-R10-R18-oth-X000

R17-X000 Change to representative recorded

St.27 status event code: A-3-3-R10-R17-oth-X000

A201 Request for examination
P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

PA0201 Request for examination

St.27 status event code: A-1-2-D10-D11-exm-PA0201

PE0902 Notice of grounds for rejection

St.27 status event code: A-1-2-D10-D21-exm-PE0902

P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

E701 Decision to grant or registration of patent right
PE0701 Decision of registration

St.27 status event code: A-1-2-D10-D22-exm-PE0701

GRNT Written decision to grant
PR0701 Registration of establishment

St.27 status event code: A-2-4-F10-F11-exm-PR0701

PR1002 Payment of registration fee

St.27 status event code: A-2-2-U10-U12-oth-PR1002

Fee payment year number: 1

PG1601 Publication of registration

St.27 status event code: A-4-4-Q10-Q13-nap-PG1601

S20-X000 Security interest recorded

St.27 status event code: A-4-4-S10-S20-lic-X000

S22-X000 Recordation of security interest cancelled

St.27 status event code: A-4-4-S10-S22-lic-X000

FPAY Annual fee payment

Payment date: 20160222

Year of fee payment: 4

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 4

FPAY Annual fee payment

Payment date: 20170217

Year of fee payment: 5

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 5

FPAY Annual fee payment

Payment date: 20180219

Year of fee payment: 6

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 6

R18-X000 Changes to party contact information recorded

St.27 status event code: A-5-5-R10-R18-oth-X000

FPAY Annual fee payment

Payment date: 20190129

Year of fee payment: 7

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 7

FPAY Annual fee payment

Payment date: 20200129

Year of fee payment: 8

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 8

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 9

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 10

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 11

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 12

PC1903 Unpaid annual fee

St.27 status event code: A-4-4-U10-U13-oth-PC1903

Not in force date: 20250228

Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

H13 Ip right lapsed

Free format text: ST27 STATUS EVENT CODE: N-4-6-H10-H13-OTH-PC1903 (AS PROVIDED BY THE NATIONAL OFFICE); TERMINATION CATEGORY : DEFAULT_OF_REGISTRATION_FEE

Effective date: 20250228

PC1903 Unpaid annual fee

St.27 status event code: N-4-6-H10-H13-oth-PC1903

Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

Not in force date: 20250228