MY135833A - Wlan session management techniques with secure rekeying logoff - Google Patents
Wlan session management techniques with secure rekeying logoffInfo
- Publication number
- MY135833A MY135833A MYPI20040889A MYPI20040889A MY135833A MY 135833 A MY135833 A MY 135833A MY PI20040889 A MYPI20040889 A MY PI20040889A MY PI20040889 A MYPI20040889 A MY PI20040889A MY 135833 A MY135833 A MY 135833A
- Authority
- MY
- Malaysia
- Prior art keywords
- secure
- logoff
- session management
- session key
- wlan
- Prior art date
Links
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
THE INVENTION PROVIDES A METHOD FOR IMPROVING THE SECURITY OF A MOBILE TERMINAL (140n) IN A WLAN ENVIRONMENT BY INSTALLING TWO SHARED SECRETS INSTEAD OF ONE SHARED SECRET, THE INITIAL SESSION KEY, ON BOTH THE WIRELESS USER MACHINE AND THE WLAN (115) ACCESS POINT (130n) DURING THE USER AUTHENTICATION PHASE.ONE OF THE SHARED SECRETS IS USED AS THE INITIAL SESSION KEY AND THE OTHER IS USED AS A SECURE SEED. SINCE THE INITIAL AUTHENTICATION IS SECURE, THESE TWO KEYS ARE NOT KNOWN TO A WOULD BE HACKER. ALTHOUGH THE INITIAL SESSION KEY MAY EVENTUALLY BE CRACKED BY THE WOULD BE HACKER, THE SECURE SEED REMAINS SECURE AS IT IS NOT USED IN ANY INSECURE COMMUNICATION.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US45454203P | 2003-03-14 | 2003-03-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
MY135833A true MY135833A (en) | 2008-07-31 |
Family
ID=33029889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI20040889A MY135833A (en) | 2003-03-14 | 2004-03-13 | Wlan session management techniques with secure rekeying logoff |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1606899A4 (en) |
JP (2) | JP2006520571A (en) |
KR (2) | KR20050116821A (en) |
CN (2) | CN1874222A (en) |
MX (1) | MXPA05009804A (en) |
MY (1) | MY135833A (en) |
WO (1) | WO2004084458A2 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006520571A (en) * | 2003-03-14 | 2006-09-07 | トムソン ライセンシング | WLAN session management technology using secure key and logoff |
US7142851B2 (en) * | 2003-04-28 | 2006-11-28 | Thomson Licensing | Technique for secure wireless LAN access |
MX2007013117A (en) * | 2005-04-22 | 2008-01-14 | Thomson Licensing | Method and apparatus for secure, anonymous wireless lan (wlan) access. |
CN102752309A (en) * | 2005-04-22 | 2012-10-24 | 汤姆森特许公司 | Method for performing safety anonymous accessing on wireless local area network by mobile equipment |
CN101454767B (en) * | 2006-04-24 | 2013-08-14 | 鲁库斯无线公司 | Dynamic authentication in secured wireless networks |
US7788703B2 (en) * | 2006-04-24 | 2010-08-31 | Ruckus Wireless, Inc. | Dynamic authentication in secured wireless networks |
WO2008001904A1 (en) | 2006-06-30 | 2008-01-03 | Nikon Corporation | Digital camera |
MX2009011831A (en) * | 2007-06-11 | 2010-03-04 | Nxp Bv | Method of authentication and electronic device for performing the authentication. |
KR101016277B1 (en) * | 2007-12-20 | 2011-02-22 | 건국대학교 산학협력단 | Method and apparatus for sip registering and establishing sip session with enhanced security |
US8756668B2 (en) | 2012-02-09 | 2014-06-17 | Ruckus Wireless, Inc. | Dynamic PSK for hotspots |
US10576256B2 (en) | 2016-12-13 | 2020-03-03 | Becton, Dickinson And Company | Antiseptic applicator |
US11689925B2 (en) * | 2017-09-29 | 2023-06-27 | Plume Design, Inc. | Controlled guest access to Wi-Fi networks |
US11496902B2 (en) | 2017-09-29 | 2022-11-08 | Plume Design, Inc. | Access to Wi-Fi networks via two-step and two-party control |
CN111404666B (en) * | 2019-01-02 | 2024-07-05 | 中国移动通信有限公司研究院 | Key generation method, terminal equipment and network equipment |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0966813A2 (en) * | 1997-03-10 | 1999-12-29 | Guy L. Fielder | Bilateral authentication and encryption system |
FI113119B (en) * | 1997-09-15 | 2004-02-27 | Nokia Corp | A method for securing communications over telecommunications networks |
US6304658B1 (en) * | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US6151677A (en) * | 1998-10-06 | 2000-11-21 | L-3 Communications Corporation | Programmable telecommunications security module for key encryption adaptable for tokenless use |
US7028186B1 (en) * | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
JP2002077129A (en) * | 2000-08-24 | 2002-03-15 | Nissin Electric Co Ltd | Method of communicating encryption |
JP2006520571A (en) * | 2003-03-14 | 2006-09-07 | トムソン ライセンシング | WLAN session management technology using secure key and logoff |
-
2004
- 2004-03-11 JP JP2006507069A patent/JP2006520571A/en active Pending
- 2004-03-11 KR KR1020057017159A patent/KR20050116821A/en not_active Application Discontinuation
- 2004-03-11 EP EP04719770A patent/EP1606899A4/en not_active Withdrawn
- 2004-03-11 MX MXPA05009804A patent/MXPA05009804A/en active IP Right Grant
- 2004-03-11 WO PCT/US2004/007403 patent/WO2004084458A2/en active Search and Examination
- 2004-03-11 KR KR1020067005624A patent/KR20060053003A/en not_active Application Discontinuation
- 2004-03-11 CN CNA2006100925525A patent/CN1874222A/en active Pending
- 2004-03-11 CN CNA2004800063151A patent/CN1759550A/en active Pending
- 2004-03-13 MY MYPI20040889A patent/MY135833A/en unknown
-
2006
- 2006-03-20 JP JP2006077107A patent/JP2006180561A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2004084458A3 (en) | 2004-11-18 |
EP1606899A2 (en) | 2005-12-21 |
CN1759550A (en) | 2006-04-12 |
EP1606899A4 (en) | 2011-11-02 |
CN1874222A (en) | 2006-12-06 |
KR20050116821A (en) | 2005-12-13 |
KR20060053003A (en) | 2006-05-19 |
JP2006520571A (en) | 2006-09-07 |
JP2006180561A (en) | 2006-07-06 |
WO2004084458A2 (en) | 2004-09-30 |
MXPA05009804A (en) | 2006-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MY135833A (en) | Wlan session management techniques with secure rekeying logoff | |
SG118221A1 (en) | Method and apparatus for initializing secure communications among and for exclusively pairing wireless devices | |
WO2005006629A3 (en) | Terminal authentication in a wireless network | |
AU2557399A (en) | Leak-resistant cryptographic method and apparatus | |
TWI268687B (en) | Cipher key setting system, access point, and cipher key setting method | |
MX2010003677A (en) | Secure wireless communication. | |
WO2007040664A3 (en) | Shared key encryption using long keypads | |
MY142729A (en) | Bootstrapping authentication using distinguished random challenges | |
WO2003032126A3 (en) | Multi-factor authentication system | |
CA2548229A1 (en) | Enabling stateless server-based pre-shared secrets | |
WO2004034213A3 (en) | Localized network authentication and security using tamper-resistant keys | |
WO2002093824A3 (en) | Authentication method | |
TW200719662A (en) | Login method for establishing a wireless local area network connection with a keeping-secret function and its system thereof | |
CA2579272A1 (en) | Method and apparatus for pseudo-secret key generation to generate a response to a challenge received from service provider | |
WO2014176046A3 (en) | Community of interest-based secured communications over ipsec | |
WO2012148096A3 (en) | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | |
DE602004026787D1 (en) | SAFE DATA TRANSFER | |
WO2004091176A3 (en) | Ciphering between a cdma network and a gsm network | |
JP2006180561A5 (en) | ||
FR2871007B1 (en) | SECURE UNLOCKING OF A MOBILE TERMINAL | |
WO2009126209A3 (en) | Methods and apparatus for authentication and identity management using a public key infrastructure (pki) in an ip-based telephony environment | |
CN107466037A (en) | A kind of login method and system of router guest network | |
WO2005029213A3 (en) | Method and system for wirelessly managing the operation of a network appliance over a limited distance | |
WO2005006627A3 (en) | Terminal identity masking in a wireless network | |
CN111669748B (en) | Mobile communication authentication method with privacy protection function |