MY135833A - Wlan session management techniques with secure rekeying logoff - Google Patents

Wlan session management techniques with secure rekeying logoff

Info

Publication number
MY135833A
MY135833A MYPI20040889A MYPI20040889A MY135833A MY 135833 A MY135833 A MY 135833A MY PI20040889 A MYPI20040889 A MY PI20040889A MY PI20040889 A MYPI20040889 A MY PI20040889A MY 135833 A MY135833 A MY 135833A
Authority
MY
Malaysia
Prior art keywords
secure
logoff
session management
session key
wlan
Prior art date
Application number
MYPI20040889A
Inventor
Junbiao Zhang
Saurabh Mathur
Sachin Satish Mody
Original Assignee
Thomson Licensing Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing Sa filed Critical Thomson Licensing Sa
Publication of MY135833A publication Critical patent/MY135833A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

THE INVENTION PROVIDES A METHOD FOR IMPROVING THE SECURITY OF A MOBILE TERMINAL (140n) IN A WLAN ENVIRONMENT BY INSTALLING TWO SHARED SECRETS INSTEAD OF ONE SHARED SECRET, THE INITIAL SESSION KEY, ON BOTH THE WIRELESS USER MACHINE AND THE WLAN (115) ACCESS POINT (130n) DURING THE USER AUTHENTICATION PHASE.ONE OF THE SHARED SECRETS IS USED AS THE INITIAL SESSION KEY AND THE OTHER IS USED AS A SECURE SEED. SINCE THE INITIAL AUTHENTICATION IS SECURE, THESE TWO KEYS ARE NOT KNOWN TO A WOULD BE HACKER. ALTHOUGH THE INITIAL SESSION KEY MAY EVENTUALLY BE CRACKED BY THE WOULD BE HACKER, THE SECURE SEED REMAINS SECURE AS IT IS NOT USED IN ANY INSECURE COMMUNICATION.
MYPI20040889A 2003-03-14 2004-03-13 Wlan session management techniques with secure rekeying logoff MY135833A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US45454203P 2003-03-14 2003-03-14

Publications (1)

Publication Number Publication Date
MY135833A true MY135833A (en) 2008-07-31

Family

ID=33029889

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI20040889A MY135833A (en) 2003-03-14 2004-03-13 Wlan session management techniques with secure rekeying logoff

Country Status (7)

Country Link
EP (1) EP1606899A4 (en)
JP (2) JP2006520571A (en)
KR (2) KR20050116821A (en)
CN (2) CN1874222A (en)
MX (1) MXPA05009804A (en)
MY (1) MY135833A (en)
WO (1) WO2004084458A2 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006520571A (en) * 2003-03-14 2006-09-07 トムソン ライセンシング WLAN session management technology using secure key and logoff
US7142851B2 (en) * 2003-04-28 2006-11-28 Thomson Licensing Technique for secure wireless LAN access
MX2007013117A (en) * 2005-04-22 2008-01-14 Thomson Licensing Method and apparatus for secure, anonymous wireless lan (wlan) access.
CN102752309A (en) * 2005-04-22 2012-10-24 汤姆森特许公司 Method for performing safety anonymous accessing on wireless local area network by mobile equipment
CN101454767B (en) * 2006-04-24 2013-08-14 鲁库斯无线公司 Dynamic authentication in secured wireless networks
US7788703B2 (en) * 2006-04-24 2010-08-31 Ruckus Wireless, Inc. Dynamic authentication in secured wireless networks
WO2008001904A1 (en) 2006-06-30 2008-01-03 Nikon Corporation Digital camera
MX2009011831A (en) * 2007-06-11 2010-03-04 Nxp Bv Method of authentication and electronic device for performing the authentication.
KR101016277B1 (en) * 2007-12-20 2011-02-22 건국대학교 산학협력단 Method and apparatus for sip registering and establishing sip session with enhanced security
US8756668B2 (en) 2012-02-09 2014-06-17 Ruckus Wireless, Inc. Dynamic PSK for hotspots
US10576256B2 (en) 2016-12-13 2020-03-03 Becton, Dickinson And Company Antiseptic applicator
US11689925B2 (en) * 2017-09-29 2023-06-27 Plume Design, Inc. Controlled guest access to Wi-Fi networks
US11496902B2 (en) 2017-09-29 2022-11-08 Plume Design, Inc. Access to Wi-Fi networks via two-step and two-party control
CN111404666B (en) * 2019-01-02 2024-07-05 中国移动通信有限公司研究院 Key generation method, terminal equipment and network equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0966813A2 (en) * 1997-03-10 1999-12-29 Guy L. Fielder Bilateral authentication and encryption system
FI113119B (en) * 1997-09-15 2004-02-27 Nokia Corp A method for securing communications over telecommunications networks
US6304658B1 (en) * 1998-01-02 2001-10-16 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US6151677A (en) * 1998-10-06 2000-11-21 L-3 Communications Corporation Programmable telecommunications security module for key encryption adaptable for tokenless use
US7028186B1 (en) * 2000-02-11 2006-04-11 Nokia, Inc. Key management methods for wireless LANs
JP2002077129A (en) * 2000-08-24 2002-03-15 Nissin Electric Co Ltd Method of communicating encryption
JP2006520571A (en) * 2003-03-14 2006-09-07 トムソン ライセンシング WLAN session management technology using secure key and logoff

Also Published As

Publication number Publication date
WO2004084458A3 (en) 2004-11-18
EP1606899A2 (en) 2005-12-21
CN1759550A (en) 2006-04-12
EP1606899A4 (en) 2011-11-02
CN1874222A (en) 2006-12-06
KR20050116821A (en) 2005-12-13
KR20060053003A (en) 2006-05-19
JP2006520571A (en) 2006-09-07
JP2006180561A (en) 2006-07-06
WO2004084458A2 (en) 2004-09-30
MXPA05009804A (en) 2006-05-19

Similar Documents

Publication Publication Date Title
MY135833A (en) Wlan session management techniques with secure rekeying logoff
SG118221A1 (en) Method and apparatus for initializing secure communications among and for exclusively pairing wireless devices
WO2005006629A3 (en) Terminal authentication in a wireless network
AU2557399A (en) Leak-resistant cryptographic method and apparatus
TWI268687B (en) Cipher key setting system, access point, and cipher key setting method
MX2010003677A (en) Secure wireless communication.
WO2007040664A3 (en) Shared key encryption using long keypads
MY142729A (en) Bootstrapping authentication using distinguished random challenges
WO2003032126A3 (en) Multi-factor authentication system
CA2548229A1 (en) Enabling stateless server-based pre-shared secrets
WO2004034213A3 (en) Localized network authentication and security using tamper-resistant keys
WO2002093824A3 (en) Authentication method
TW200719662A (en) Login method for establishing a wireless local area network connection with a keeping-secret function and its system thereof
CA2579272A1 (en) Method and apparatus for pseudo-secret key generation to generate a response to a challenge received from service provider
WO2014176046A3 (en) Community of interest-based secured communications over ipsec
WO2012148096A3 (en) Method of sharing a session key between wireless communication terminals using a variable-length authentication code
DE602004026787D1 (en) SAFE DATA TRANSFER
WO2004091176A3 (en) Ciphering between a cdma network and a gsm network
JP2006180561A5 (en)
FR2871007B1 (en) SECURE UNLOCKING OF A MOBILE TERMINAL
WO2009126209A3 (en) Methods and apparatus for authentication and identity management using a public key infrastructure (pki) in an ip-based telephony environment
CN107466037A (en) A kind of login method and system of router guest network
WO2005029213A3 (en) Method and system for wirelessly managing the operation of a network appliance over a limited distance
WO2005006627A3 (en) Terminal identity masking in a wireless network
CN111669748B (en) Mobile communication authentication method with privacy protection function