KR101916034B1 - 무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치 - Google Patents

무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치 Download PDF

Info

Publication number
KR101916034B1
KR101916034B1 KR1020120002755A KR20120002755A KR101916034B1 KR 101916034 B1 KR101916034 B1 KR 101916034B1 KR 1020120002755 A KR1020120002755 A KR 1020120002755A KR 20120002755 A KR20120002755 A KR 20120002755A KR 101916034 B1 KR101916034 B1 KR 101916034B1
Authority
KR
South Korea
Prior art keywords
cmac
tek
short message
rng
data burst
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
KR1020120002755A
Other languages
English (en)
Korean (ko)
Other versions
KR20120081036A (ko
Inventor
백영교
강현정
Original Assignee
삼성전자주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 삼성전자주식회사 filed Critical 삼성전자주식회사
Publication of KR20120081036A publication Critical patent/KR20120081036A/ko
Application granted granted Critical
Publication of KR101916034B1 publication Critical patent/KR101916034B1/ko
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
KR1020120002755A 2011-01-10 2012-01-10 무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치 Active KR101916034B1 (ko)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20110002474 2011-01-10
KR1020110002474 2011-01-10

Publications (2)

Publication Number Publication Date
KR20120081036A KR20120081036A (ko) 2012-07-18
KR101916034B1 true KR101916034B1 (ko) 2018-11-08

Family

ID=46455260

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120002755A Active KR101916034B1 (ko) 2011-01-10 2012-01-10 무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치

Country Status (5)

Country Link
US (2) US8625798B2 (enExample)
JP (1) JP5855127B2 (enExample)
KR (1) KR101916034B1 (enExample)
CN (1) CN103430478B (enExample)
WO (1) WO2012096496A2 (enExample)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10298386B1 (en) * 2009-06-26 2019-05-21 Marvell International Ltd. Method and apparatus for secure communications in networks
JP5855127B2 (ja) * 2011-01-10 2016-02-09 サムスン エレクトロニクス カンパニー リミテッド 無線通信システムにおける短文データの暗号化方法及び装置
US9209886B2 (en) * 2012-01-10 2015-12-08 Electronics And Telecommunications Research Institute Terminal and communication method thereof
CN104322089A (zh) * 2012-05-23 2015-01-28 诺基亚公司 用于蜂窝网络的控制下的本地接入的密钥导出方法和设备
US9497142B2 (en) 2012-11-30 2016-11-15 T-Mobile Usa, Inc. Triggering actions on a computing device
US9398448B2 (en) * 2012-12-14 2016-07-19 Intel Corporation Enhanced wireless communication security
US10671546B2 (en) 2015-09-30 2020-06-02 Hewlett Packard Enterprise Development Lp Cryptographic-based initialization of memory content
DE102017204184A1 (de) * 2017-03-14 2018-09-20 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Authentisierte Bestätigungs- und Aktivierungsnachricht
WO2018214052A1 (en) * 2017-05-24 2018-11-29 Qualcomm Incorporated Uplink small data transmission in inactive state
US11405185B2 (en) * 2017-09-28 2022-08-02 Apple Inc. Methods and architectures for secure ranging
CN110130703A (zh) * 2018-02-08 2019-08-16 郑州大学 智能立体车库模拟系统
SG10201906806XA (en) * 2019-07-23 2021-02-25 Mastercard International Inc Methods and computing devices for auto-submission of user authentication credential
CN116249105A (zh) * 2021-12-07 2023-06-09 中国移动通信有限公司研究院 密钥更新方法及装置
US20240235823A1 (en) * 2023-01-05 2024-07-11 Qualcomm Incorporated Broadcast and/or groupcast security for device-to-device positioning
CN116389138B (zh) * 2023-04-07 2023-11-24 深圳市众志天成科技有限公司 一种基于数据传输时的信息安全保护方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132599A1 (en) 2008-04-30 2009-11-05 Mediatek Inc. Method for deriving traffic encryption key
US20090307496A1 (en) 2008-06-03 2009-12-10 Lg Electronics Inc. Method of deriving and updating traffic encryption key
US20100069097A1 (en) 2008-09-17 2010-03-18 Qualcomm Incorporated Methods and apparatus for implementing short message service in wireless communicaiton networks

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030023117A (ko) * 2001-09-12 2003-03-19 에스케이 텔레콤주식회사 공개키 기반의 무선단문메시지 보안 및 인증방법
US7991158B2 (en) * 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
CN101203025B (zh) * 2006-12-15 2010-11-10 上海晨兴电子科技有限公司 安全的移动信息发送和接收方法
US8666077B2 (en) * 2008-05-07 2014-03-04 Alcatel Lucent Traffic encryption key generation in a wireless communication network
US8543091B2 (en) * 2008-06-06 2013-09-24 Ebay Inc. Secure short message service (SMS) communications
KR101199072B1 (ko) * 2008-06-13 2012-11-07 후지쯔 가부시끼가이샤 게이트웨이 장치, 무선 송신 제어 방법 및 무선 통신 시스템
US8707045B2 (en) * 2009-02-12 2014-04-22 Lg Electronics Inc. Method and apparatus for traffic count key management and key count management
KR20100109998A (ko) * 2009-04-02 2010-10-12 삼성전자주식회사 무선통신시스템에서 핸드오버 레인징 메시지의 인증 처리 장치 및 방법
US20110302416A1 (en) * 2010-03-15 2011-12-08 Bigband Networks Inc. Method and system for secured communication in a non-ctms environment
JP5855127B2 (ja) * 2011-01-10 2016-02-09 サムスン エレクトロニクス カンパニー リミテッド 無線通信システムにおける短文データの暗号化方法及び装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132599A1 (en) 2008-04-30 2009-11-05 Mediatek Inc. Method for deriving traffic encryption key
US20090307496A1 (en) 2008-06-03 2009-12-10 Lg Electronics Inc. Method of deriving and updating traffic encryption key
US20100069097A1 (en) 2008-09-17 2010-03-18 Qualcomm Incorporated Methods and apparatus for implementing short message service in wireless communicaiton networks

Also Published As

Publication number Publication date
US20140126721A1 (en) 2014-05-08
US8625798B2 (en) 2014-01-07
JP5855127B2 (ja) 2016-02-09
CN103430478B (zh) 2016-08-24
US9088890B2 (en) 2015-07-21
KR20120081036A (ko) 2012-07-18
CN103430478A (zh) 2013-12-04
WO2012096496A3 (en) 2012-12-06
JP2014508436A (ja) 2014-04-03
WO2012096496A2 (en) 2012-07-19
US20120177199A1 (en) 2012-07-12

Similar Documents

Publication Publication Date Title
KR101916034B1 (ko) 무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치
US11122428B2 (en) Transmission data protection system, method, and apparatus
JP5479474B2 (ja) 選択的な制御信号暗号化方法
KR101294816B1 (ko) 제어신호 암호화 방법
US8397071B2 (en) Generation method and update method of authorization key for mobile communication
US8582771B2 (en) Method for selectively encrypting control signal
CN101512537A (zh) 在自组无线网络中安全处理认证密钥资料的方法和系统
WO2020248624A1 (zh) 一种通信方法、网络设备、用户设备和接入网设备
CN108012266A (zh) 一种数据传输方法及相关设备
WO2022144007A1 (zh) 控制帧处理及生成方法、站点、接入点及存储介质
WO2022237561A1 (zh) 一种通信方法及装置
WO2022134089A1 (zh) 一种安全上下文生成方法、装置及计算机可读存储介质
CN110495153A (zh) 在预关联的状态中加密数据
KR101670743B1 (ko) 트래픽 카운트 키 및 키 카운트 관리 방법 및 장치
KR100330418B1 (ko) 이동통신 환경에서의 가입자 인증 방법
WO2025111755A1 (en) Method and apparatus for communications with post-quantum cryptography
KR101094057B1 (ko) 이동 통신시스템의 초기 시그널링 메시지 처리 방법 및장치
WO2025156599A1 (en) Method, device and computer program product for wireless communication
KR101559784B1 (ko) 선택적인 제어 신호 암호화 방법
KR20100032277A (ko) 제어필드를 이용한 선택적인 제어신호 암호화 방법
KR20100053407A (ko) 보안정보 공유방법
KR101578004B1 (ko) 플로우 식별자를 이용한 선택적인 제어신호 암호화 방법
Kucharzewski et al. Mobile identity management system in heterogeneous wireless networks
KR20100030610A (ko) 선택적인 제어신호 암호화 방법

Legal Events

Date Code Title Description
PA0109 Patent application

St.27 status event code: A-0-1-A10-A12-nap-PA0109

R18-X000 Changes to party contact information recorded

St.27 status event code: A-3-3-R10-R18-oth-X000

PG1501 Laying open of application

St.27 status event code: A-1-1-Q10-Q12-nap-PG1501

A201 Request for examination
P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

PA0201 Request for examination

St.27 status event code: A-1-2-D10-D11-exm-PA0201

D13-X000 Search requested

St.27 status event code: A-1-2-D10-D13-srh-X000

D14-X000 Search report completed

St.27 status event code: A-1-2-D10-D14-srh-X000

E902 Notification of reason for refusal
PE0902 Notice of grounds for rejection

St.27 status event code: A-1-2-D10-D21-exm-PE0902

P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

E701 Decision to grant or registration of patent right
PE0701 Decision of registration

St.27 status event code: A-1-2-D10-D22-exm-PE0701

PR0701 Registration of establishment

St.27 status event code: A-2-4-F10-F11-exm-PR0701

PR1002 Payment of registration fee

St.27 status event code: A-2-2-U10-U11-oth-PR1002

Fee payment year number: 1

PG1601 Publication of registration

St.27 status event code: A-4-4-Q10-Q13-nap-PG1601

P22-X000 Classification modified

St.27 status event code: A-4-4-P10-P22-nap-X000

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 4

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 5

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 6

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 7

PR1001 Payment of annual fee

St.27 status event code: A-4-4-U10-U11-oth-PR1001

Fee payment year number: 8