WO2008037670A1 - Verfahren zum bereitstellen eines symmetrischen schlüssels zum sichern eines schlüssel-management-protokolls - Google Patents
Verfahren zum bereitstellen eines symmetrischen schlüssels zum sichern eines schlüssel-management-protokolls Download PDFInfo
- Publication number
- WO2008037670A1 WO2008037670A1 PCT/EP2007/060069 EP2007060069W WO2008037670A1 WO 2008037670 A1 WO2008037670 A1 WO 2008037670A1 EP 2007060069 W EP2007060069 W EP 2007060069W WO 2008037670 A1 WO2008037670 A1 WO 2008037670A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cscf
- time
- symmetric key
- uel
- nonce
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Definitions
- the invention relates to a method for providing a symmetric key for securing a key management ⁇ ment protocol.
- the technical field of the present invention relates to securing or encrypting media data between a subscriber device, such as a personal computer, and a provider device, such as a media server of a service provider or provider.
- RFC 3711 defines a profile for RTP, Secure-RTP (SRTP), to secure the RTP stream.
- SRTP Secure-RTP
- SRTP can be used to secure media traffic on an end-to-end connection, ie the complete path between two communicating parties.
- RTP can also be used for an end-to-middle connection.
- a security protocol with an appropriate master key to derive Wegungsschlüs ⁇ clauses and cryptographic context must be provided.
- An example of a cryptographic context is described in Section 3.2 of RFC 3711.
- the master key and the cryptographic context Prior to the start of communication between the subscriber equipment and the provider equipment, such as a media proxy, the master key and the cryptographic context are not available in the subscriber equipment and the provider equipment. Thus, it is necessary to provide means which provide the main ⁇ key and the cryptographic context.
- a key management protocol can be a ⁇ set.
- MIKEY An example of a key management protocol for SRTP is MIKEY. MIKEY is described in
- the key management protocol is executed between the subscriber equipment and the appropriate server of the network.
- the appropriate server need not be the Me ⁇ serving proxy. Alternatively, this can coincide with the SIP proxy. However, the key management protocol itself must be backed up.
- another object of the present invention is to secure a key management protocol for a protocol for the encrypted transmission of media data, such as SRTP, between a subscriber device and a provider device.
- symmetric key ei ⁇ ner subscriber device and a corresponding provider means to provide means for securing a key management protocol for a protocol for encrypted transmission of media data between the user device and the provider.
- a method for providing a symmetric key for securing a key management protocol, by means of which cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device, the method being as follows Steps:
- - Compute a second symmetric key for securing the key management protocol by means of a predetermined function as a function of at least the ready ⁇ provided first symmetric key and the provided first time-variable parameter by the provider device; and - calculating the second symmetric key using the predetermined function in dependence of at least the ready made ⁇ first symmetric key and the transmitted first time-varying parameter by the user equipment.
- a method for encrypting media data between a subscriber device and a provider device comprises the following steps: providing a symmetric key of the subscriber device and the provider device by means of the above-explained method for providing a symmetric key for securing a Key management protocol; - Encrypt the media data in response to the symmetric key by the subscriber device or the provider device;
- the present invention provides a way, the key management protocol, which cryptographic material means is generated with ⁇ means of a protocol, such as SRTP, to the encrypted media data see be- a subscriber device and a provider, to secure.
- the backup of the key management protocol is advantageously carried out an easy-to-handle, symmetric encryption method secured with a symmetric key.
- the protocol for the encrypted transmission of the media data is designed as a Secure Real-Time Transport Protocol (SRTP).
- SRTP Secure Real-Time Transport Protocol
- the key management protocol is designed as multimedia internet keying (MIKEY).
- the securing mechanism as the authentication and / or Integri ⁇ tuschsprotokoll, in particular as HTTP digest protocol, out ⁇ forms.
- the network protocol for establishing the communication connection is designed as a session initiation protocol (SIP).
- SIP session initiation protocol
- the cryptographic material has a master key for deriving session keys and cryptographic context.
- the key management protocol is used in the control layer and / or in a media layer.
- the method explained above further comprises the following steps: generating a second time-variable parameter by the subscriber device; - transmitting the generated second time-variable parameter from the subscriber device to the provider device;
- a third time-variable parameter is derived in each case by the subscriber device and the provider device from the first time-variable parameter, as a function of which the second symmetric key is calculated by the subscriber device and the provider device.
- the first time-variable parameter is a Number-Used-Once (Nonce) and / or the second time-variant parameter is one
- Client-Defined-Nonce (CNonce) and / or the third zeitverän ⁇ cal parameters formed as a nonce count of the HTTP digest protocol.
- the predetermined function is divisible into a first sub-function and a second sub-function, the first sub-function having at least the first symmetric key and the first time-variant parameter as the input parameter and the second sub-function at least a result of the first
- the subscriber device and the provider device at least partially form an IP multimedia subsystem (IMS).
- IMS IP multimedia subsystem
- the provider apparatus of the IP Multimedia Subsystem IMS: a proxy functionality unit which is coupled to the parti ⁇ mer pain, and / or - a Interrogations functionality unit which with the proxy functionality unit coupled, and / or
- server functionality unit which is coupled to the interrogation functionality unit, and / or
- a home subscriber server unit which is coupled to the server functionality unit and stores at least the first symmetric key.
- the HTTP digest protocol is executed between the subscriber device and the server functionality unit.
- the HTTP digest protocol is executed between the subscriber device and the home subscriber server unit.
- the first part function of the server functionality unit is ⁇ leads, the result of the first part-function is transmitted from the server functionality unit to the proxy functionality unit, the second zeitver Sli ⁇ che parameter is used by the proxy emp catch -JE Chemie ⁇ and the second part-function is performed by the proxy functionality unit.
- the first part-function from the home subscriber server unit is ⁇ leads
- the result of the first part function is provided by the Home Subscriber Server unit to the Proxy-Schein- Interrogations uniform over the functionality unit übertra ⁇ gene
- the second time-varying parameter is received by the Pro ⁇ xy functionality unit and the second partial function is excluded from the proxy functionality unit performs.
- the subscriber device has a SIP-based subscription with the provider device.
- FIG. 1 shows a schematic block diagram of a SIP-based communication architecture to which the method according to the invention can be applied;
- FIG. 2 shows a schematic flow diagram of a first exemplary embodiment of the method according to the invention
- FIG. 3 shows a schematic flow diagram of a second embodiment of the method according to the invention.
- FIG. 5 is a schematic flow diagram of a third embodiment of the method according to the invention, applied to the IMS architecture according to FIG. 4;
- FIG. 6 shows a schematic flow diagram of a fourth embodiment of the method according to the invention, applied to the IMS architecture according to FIG. 4.
- the same or functionally identical elements and units - unless otherwise indicated - have been given the same reference numerals.
- FIG. 1 shows a schematic block diagram of a SIP-based communication architecture SKA to which the method according to the invention can be applied.
- the SIP-based communication architecture SKA according to FIG. 1 is formed by a first user equipment UE1, a first provider equipment PE1, a second provider equipment PE2 and a second user equipment UE2.
- the first subscriber device UE1 is coupled to the first provider device PE1.
- the second subscriber device UE2 is coupled to the second provider device PE2.
- the first provider device PE1 and the second provider device PE2 are coupled.
- the Koppe ⁇ ment between the first provider device PEI and the second provider device PE2 can be formed by a network, in particular the Internet.
- a provider device PE1, PE2 has a database DB1, DB2, a SIP proxy functional unit SP1, SP2 and a media proxy functionality unit MP1, MP2.
- the Session Initiation Protocol SIP is particularly Zvi ⁇ rule of the subscriber device and the UEL SIP functionalities tucisritt SPl executed. For reasons of clarity, a corresponding representation for the second subscriber device UE2 and the second provider device PE2 is not shown.
- the secure real-time protocol SRTP is executed between the first user equipment UE1 and the media proxy functionality unit MP1.
- FIG. 2 is a schematic flow diagram of a first embodiment of the method according to the invention for Semi provide a symmetric key NK for securing a key management protocol, the system with which krytographi- ULTRASONIC material generated for a protocol for encrypted Götra ⁇ gene of media data MD between the subscriber device and the provider device UEL PEI is shown.
- the method according to the invention will now be described with reference to the block diagram in FIG. 2 with reference to the architecture according to FIG. 1.
- the first exemplary embodiment of the method according to the invention according to FIG. 2 has the following method steps S1 to S5:
- a first symmetrical key DK is made available to the subscriber device UE1 and to the provider device PE1.
- the first symmetric key DK is used in a generic keys based symmet ⁇ Sich ceremoniessmechanimus a network protocol of a control layer for establishing a Kiru ⁇ nikationssitzung between the subscriber device and the provider device UEL PEI.
- a first time-variant parameter Nonce is provided by the provider device PE1.
- the provided first time-variable parameter Nonce is transmitted from the provider device PE1 to the user equipment UE1.
- the method steps S4 and S5 can also be carried out in the reverse order.
- the provi ⁇ the device PEI is the NK key only calculated when the user equipment is authenticated UEL.
- FIG. 3 A second embodiment of the procedural ⁇ proceedings according to the invention is shown in Fig. 3.
- the secondstrasbei ⁇ game according to FIG. 3 the method steps Tl to T7.
- the method steps Tl to T3 according to FIG. 3 correspond to the method steps S1 to S3 according to FIG.
- the second embodiment of Figure 3 thus comprises the steps of Tl to T3, which correspond to the Ver ⁇ method steps Sl to S3 of Figure 2, and the following method steps T4 to T7.:
- a second time-variable parameter CNonce is generated by the subscriber device UE1.
- the generated second time-variable parameter CNonce is transmitted from the subscriber device UE1 to the provider device PE1.
- the provi ⁇ the device PEI is the NK key only calculated when the user equipment is authenticated UEL.
- the inventive method in particular for the embodiments according to FIGS. 2 and 3, follow ⁇ de embodiments are advantageously possible.
- the protocol for the encrypted transmission of the media data MD can be embodied as a Secure Real-Time Transport Protocol (SRTP).
- SRTP Secure Real-Time Transport Protocol
- the key management protocol can be called
- the locking mechanism may be an authentication and / or tegrticiansprotokoll In ⁇ , in particular a HTTP Digest Be a log.
- the network protocol for the construction of the communi ⁇ cation compound may be the Session Initiation Protocol (SIP).
- the cryptographic material may include a master key for deriving session keys and cryptographic context.
- the key management protocol is used in the control layer and / or in a media layer.
- a third time-variable parameter Nonce-Count can also be derived by the subscriber device UE1 and the provider device PE1 from the first time-variable parameter Nonce.
- the second symmetric key NK can be calculated in each case by the subscriber device UE1 and the provider device PE1.
- the HTTP digest authentication is that according to the invention is preferably used as a Si ⁇ cherungsmechanismus, described in RFC 2618 and RFC 3261st
- the first time-variable parameter is preferably designed as a number-used-once (nonce).
- the second time-variant parameter is in particular a client-defined nonce (CNonce).
- the third time-variable parameter is preferably designed as a nonce count of the HTTP digest protocol.
- the HTTP Digest protocol is its compliance is ⁇ as a backup mechanism for the Session Initiation Protocol SIP.
- Examples of HTTP digest authentication are Push-To-Talk-over-Cellular (PoC) [OMA PoC Release 1] or ETSI TISPAN Specification ETSI TS 183033.
- Another example of using HTTP digest for a IMS architecture is the packet cable specification PKT-SP-33.203.
- the provider device PE1 of the IP multimedia subsystem IMS according to FIG. 4 has a proxy-functional unit P-CSCF, an interogation functional unit I-CSCF, a server-functional unit S-CSCF and a home-subscriber-server unit HSS ,
- P-CSCF is coupled to the user equipment UEl.
- the interrogation functionality unit I-CSCF is coupled to the proxy functional unit P-CSCF, the server functionality unit S-CSCF is coupled to the interrogation functionality unit I-CSCF and the home subscriber server unit HSS is connected to the Server functionality unit S-CSCF coupled.
- spei ⁇ chert the Home Subscriber Server unit preferably the first symmetric key DK.
- the user equipment UE1 and the home subscriber server unit HSS are each equipped with the symmetric key DK for authentication by the HTTP digest.
- the user equipment UEl sends a first unauthorized SIP register message to the P-CSCF, which forwards it to the S-CSCF.
- the S-CSCF queries a Nationalidenti ⁇ fication or Subscriptionsoire in the HSS. Two alternatives are possible:
- the S-CSCF receives the key DK from the HSS.
- the S-CSCF stores the key DK to authenticate ⁇ tion of the subscriber device UEL means of the next re gister message.
- the S-CSCF terminates the HTTP digest protocol.
- the S-CSCF generates the second key NK using the first key DK and the first time-variable parameter Nonce and sends the second key NK in the SIP-401 Unauthorized message to the P-CSCF.
- the subscriber device UEL generated, after receiving this message, also the second Keyring ⁇ sel NK in a similar manner using the first key DK and the time varying parameter nonce.
- ⁇ all recently has the P-CSCF the NK key corresponds removed from the message, or he would easily eavesdrop on the way from the P-CSCF to the user equipment UEL.
- the subscriber key UE1 and the P-CSCF are thus aware of the second key NK.
- the HSS generates the second key NK using the first key DK and the first time-variable parameter Nonce by means of the predetermined function F and sends the generated second key NK in an IMS message to the S-CSCF containing the second key NK in a SIP-401 Unauthorized message to P-CSCF go ⁇ passes.
- the subscriber device UE1 will also, after having received this message, generate the second key NK in the same way using the nonce and the first key DK.
- the P-CSCF has removed the key NK from the message, otherwise it would be easy to listen on the way from the P-CSCF to the user equipment UE1.
- the first user equipment UE1 and the P-CSCF, the second key NK are provided.
- Alternative 1 The S-CSCF NK generated using DK, Nonce and cnonce as input parameters for the Quilt ⁇ voted function F. But NK can not be 401 message from the S-CSCF to the P-CSCF because CNonce is not available in the S-CSCF at this time. However, it is possible to send NK in the SIP 200 OK message (see message 9 in FIG. 5).
- the user equipment UE1 can also generate NK by means of the predetermined function F using DK, Nonce and CNonce.
- the P-CSCF has the NK key from the message ent ⁇ removed, otherwise he would easily eavesdrop on the way from the P-CSCF to the user equipment UEL. Thus, the user equipment UE1 and the P-CSCF have the second key NK.
- the predetermined function F can be divided into a first part function Fl and a second part function F2.
- the first partial function F1 has at least the first symmetric key DK and the first time-variable parameter Nonce as the input parameter
- the second partial function F2 has at least one result of the first partial function F1 (DK, Nonce) and the second time-variant Parameter CNonce as input parameter.
- HSS performs the first part of function Fl and calculates the result Fl (Nonce, DK) and sends the result ⁇ He Fl (Nonce, DK) in an IMS message to the S-CSCF.
- the subscriber device UE1 can then also, after having received this message, generate the second key NK using Nonce and DK.
- the P-CSCF has the NK key is removed from the message, or he would easily eavesdrop on the way from the P-CSCF for part ⁇ taking purely directional UEL.
- both the user equipment UEl and the P-CSCF have the same second key NK.
- the result of the first partial function F1 (Nonce, DK) from the S-CSCF to the P-CSCF in the 401
- the P-CSCF can calculate the second key NK depending on this and the intercepted CNonce.
- the user equipment UEl sends the initial SIP register request to the address of the P-CSCF, which is preconfigured in the IMS architecture IMS.
- the request includes an authorization header that has the private user identity IMPI.
- the P-CSCF forwards the received message to the S-CSCF via the I-CSCF.
- the I-CSCF is not shown in FIGS. 5 and 6.
- the S-CSCF transmits authentication data from the HSS
- the HSS responds with a multimedia Auth reply MAA, which contains the first key DK for the HTTP digest.
- the S-CSCF generates the second key NK by means of the predetermined function F using DK and Nonce as input parameters.
- the S-CSCF indexes the P-CSCF via the I-CSCF by means of a SIP 401 Unauthorized message that HTTP digest authentication was requested.
- the SIP 401 Unauthorized message contains a WWW Authenticate header with the nonce.
- the second Key NK is transported to the P-CSCF so that the key management protocol can be executed.
- the P-CSCF may store the second key NK and forwards the SIP 401 Unauthorized message to the subscriber device ⁇ UEL, but without the second key NK.
- the stored second key NK may not be used by the P-CSCF as long as the registration process is not successfully completed (from step 9 of FIG. 5, NK may be used).
- the user equipment UEl calculates the digest value Digest using the stored first key DK and the received nonce.
- the user equipment UEl sends a second SIP register request to the P-CSCF containing an authorization header comprising the IMPI and the calculated digest value Digest.
- the P-CSCF forwards the received message via the I-CSCF to the S-CSCF.
- the S-CSCF After the S-CSCF has received this message, be it expects ⁇ again the digest value Digest using the stored key DK, which it has previously received from the HSS, as a digest key and the nonce.
- the S-CSCF compares the calculated digest value digest with the digest value Digest received from the user equipment UE1. If both match, the registration is successfully completed by sending a SIP 200 OK message to the user equipment UEl. If the 200-OK message passes the P-CSCF, the P-CSCF can also assume a successful com ⁇ pletting of the registration process and can from there on the second key NK, the chi saved in step 6, use ⁇ .
- the user equipment UE1 If, for example, the user equipment UE1 wishes to have an encrypted session, it can store an encrypted master key enc (MK) in the SIP invitee. Message (see message 10 in FIG. 5) to the P-CSCF. The encryption of the master key MK in the encrypted master key enc (MK) is performed by means of the two ⁇ th symmetric key NK. After the second key NK of the P-CSCF is known, it can decrypt the received, encrypted master key enc (MK).
- MK master key enc
- the initiation of the session is confirmed by sending the second SIP OK message back to the user equipment UE1.
- the session is initiated by the user equipment UE1.
- the initiation of the session by the provider institution PEI, in particular through the P-CSCF SUC ⁇ gen.
- FIG. 6 shows a schematic flow diagram of the method according to the invention for example 1 with alternative 2.
- the fourth exemplary embodiment according to FIG. 6 differs from the third exemplary embodiment according to FIG. 5 in step 4.
- Step 4 in FIG. 6 is different from step 4 in FIG 5, that the HSS according to Figure 6 only the second key NK and not directly sent the first key DK.
- the expected digest value Di ⁇ gest is sent to the S-CSCF.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07820477A EP2082521A1 (de) | 2006-09-28 | 2007-09-24 | Verfahren zum bereitstellen eines symmetrischen schlüssels zum sichern eines schlüssel-management-protokolls |
KR1020097008709A KR101488167B1 (ko) | 2006-09-28 | 2007-09-24 | 키관리 프로토콜을 보호하기 위해 대칭 키를 제공하는 방법 |
US12/311,358 US8488795B2 (en) | 2006-09-28 | 2007-09-24 | Method for providing a symmetric key for protecting a key management protocol |
JP2009529672A JP2010505313A (ja) | 2006-09-28 | 2007-09-24 | 鍵管理プロトコルを保護するための対称鍵を設ける方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102006046017.0 | 2006-09-28 | ||
DE102006046017A DE102006046017B4 (de) | 2006-09-28 | 2006-09-28 | Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008037670A1 true WO2008037670A1 (de) | 2008-04-03 |
WO2008037670B1 WO2008037670B1 (de) | 2008-06-12 |
Family
ID=39052439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2007/060069 WO2008037670A1 (de) | 2006-09-28 | 2007-09-24 | Verfahren zum bereitstellen eines symmetrischen schlüssels zum sichern eines schlüssel-management-protokolls |
Country Status (7)
Country | Link |
---|---|
US (1) | US8488795B2 (de) |
EP (1) | EP2082521A1 (de) |
JP (1) | JP2010505313A (de) |
KR (1) | KR101488167B1 (de) |
CN (1) | CN101536399A (de) |
DE (1) | DE102006046017B4 (de) |
WO (1) | WO2008037670A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006006071A1 (de) * | 2006-02-09 | 2007-08-16 | Siemens Ag | Verfahren zum Übertragen von Mediendaten, Netzwerkanordnung mit Computerprogrammprodukt |
US20120137137A1 (en) * | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
EP3054622B1 (de) * | 2013-11-04 | 2019-08-28 | Huawei Technologies Co., Ltd. | Verfahren und vorrichtung zur verarbeitung von schlüsselverhandlungen |
CN103560892A (zh) * | 2013-11-21 | 2014-02-05 | 深圳中兴网信科技有限公司 | 密钥生成方法和密钥生成装置 |
CN104683304B (zh) * | 2013-11-29 | 2019-01-01 | 中国移动通信集团公司 | 一种保密通信业务的处理方法、设备和系统 |
CN104901966B (zh) * | 2015-06-02 | 2016-06-08 | 慧锐通智能科技股份有限公司 | 一种网络通讯的密钥配置方法及系统 |
US10545940B2 (en) | 2017-02-22 | 2020-01-28 | Red Hat, Inc. | Supporting secure layer extensions for communication protocols |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10238928A1 (de) * | 2002-08-22 | 2004-03-11 | Siemens Ag | Verfahren zur Authentifizierung eines Nutzers eines Kommunikationsendgerätes bei Nutzung eines Dienstnetzes |
US20050063544A1 (en) | 2001-12-07 | 2005-03-24 | Ilkka Uusitalo | Lawful interception of end-to-end encrypted data traffic |
WO2005039141A1 (de) * | 2003-10-14 | 2005-04-28 | Siemens Aktiengesellschaft | Verfaren zur sicherung des datenverkehrs zwischen einem mobilfunknetz und einem ims-netz |
DE10355418A1 (de) * | 2003-11-27 | 2005-07-07 | Siemens Ag | Sicherheitsmodul zum Verschlüsseln eines Telefongesprächs |
US20060062393A1 (en) | 2004-09-21 | 2006-03-23 | Hsu Raymond T | Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5720034A (en) * | 1995-12-07 | 1998-02-17 | Case; Jeffrey D. | Method for secure key production |
JP2002290391A (ja) | 2001-03-26 | 2002-10-04 | Toyo Commun Equip Co Ltd | 共通鍵暗号方式におけるセッション鍵生成方式及び暗号化/復号装置。 |
SG105005A1 (en) | 2002-06-12 | 2004-07-30 | Contraves Ag | Device for firearms and firearm |
DE10307403B4 (de) * | 2003-02-20 | 2008-01-24 | Siemens Ag | Verfahren zum Bilden und Verteilen kryptographischer Schlüssel in einem Mobilfunksystem und Mobilfunksystem |
US7908484B2 (en) * | 2003-08-22 | 2011-03-15 | Nokia Corporation | Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack |
-
2006
- 2006-09-28 DE DE102006046017A patent/DE102006046017B4/de active Active
-
2007
- 2007-09-24 EP EP07820477A patent/EP2082521A1/de not_active Withdrawn
- 2007-09-24 US US12/311,358 patent/US8488795B2/en active Active
- 2007-09-24 WO PCT/EP2007/060069 patent/WO2008037670A1/de active Application Filing
- 2007-09-24 CN CN200780035953.XA patent/CN101536399A/zh active Pending
- 2007-09-24 JP JP2009529672A patent/JP2010505313A/ja not_active Withdrawn
- 2007-09-24 KR KR1020097008709A patent/KR101488167B1/ko active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050063544A1 (en) | 2001-12-07 | 2005-03-24 | Ilkka Uusitalo | Lawful interception of end-to-end encrypted data traffic |
DE10238928A1 (de) * | 2002-08-22 | 2004-03-11 | Siemens Ag | Verfahren zur Authentifizierung eines Nutzers eines Kommunikationsendgerätes bei Nutzung eines Dienstnetzes |
WO2005039141A1 (de) * | 2003-10-14 | 2005-04-28 | Siemens Aktiengesellschaft | Verfaren zur sicherung des datenverkehrs zwischen einem mobilfunknetz und einem ims-netz |
DE10355418A1 (de) * | 2003-11-27 | 2005-07-07 | Siemens Ag | Sicherheitsmodul zum Verschlüsseln eines Telefongesprächs |
US20060062393A1 (en) | 2004-09-21 | 2006-03-23 | Hsu Raymond T | Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol |
Non-Patent Citations (1)
Title |
---|
MENEZES ET AL: "Handbook of Applied Cryptography , PASSAGE", 1997, HANDBOOK OF APPLIED CRYPTOGRAPHY, CRC PRESS SERIES ON DISCRETE MATHEMATICES AND ITS APPLICATIONS, BOCA RATON, FL, CRC PRESS, US, PAGE(S) 497-552, ISBN: 0-8493-8523-7, XP002248262 * |
Also Published As
Publication number | Publication date |
---|---|
DE102006046017B4 (de) | 2010-01-14 |
JP2010505313A (ja) | 2010-02-18 |
EP2082521A1 (de) | 2009-07-29 |
US8488795B2 (en) | 2013-07-16 |
CN101536399A (zh) | 2009-09-16 |
WO2008037670B1 (de) | 2008-06-12 |
DE102006046017A1 (de) | 2008-04-03 |
KR101488167B1 (ko) | 2015-01-30 |
KR20090067194A (ko) | 2009-06-24 |
US20100034384A1 (en) | 2010-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1595420B1 (de) | Verfahren zum bilden und verteilen kryptographischer schlüssel in einem mobilfunksystem und entsprechendes mobilfunksystem | |
DE60209475T2 (de) | Datensicherungs-kommunikationsvorrichtung und -verfahren | |
EP1793525B1 (de) | Verfahren zum Ändern eines Gruppenschlüssels in einer Gruppe von Netzelementen in einem Netz | |
WO1997047109A1 (de) | Verfahren zum kryptographischen schlüsselmanagement zwischen einer ersten computereinheit und einer zweiten computereinheit | |
DE102006046017B4 (de) | Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls | |
EP2014010B1 (de) | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten | |
EP2593897B1 (de) | Verfahren zur zertifikats-basierten authentisierung | |
EP1982494A1 (de) | Verfahren, vorrichtung und computerprogrammprodukt zum verschlüsselten übertragen von mediendaten zwischen dem medienserver und dem teilnehmergerät | |
WO2009086845A1 (de) | Verfahren zum authentisieren einer schlüsselinformation zwischen endpunkten einer kommunikationsbeziehung | |
WO2019145207A1 (de) | Verfahren und system zur offenlegung mindestens eines kryptographischen schlüssels | |
DE102020003739A1 (de) | Verfahren zur Verteilung und Aushandlung von Schlüsselmaterial | |
EP1673921B1 (de) | Verfahren zur sicherung des datenverkehrs zwischen einem mobilfunknetz und einem ims-netz | |
EP3759958B1 (de) | Verfahren, vorrichtung und computerprogrammprodukt zur überwachung einer verschlüsselten verbindung in einem netzwerk | |
EP3799379A1 (de) | Verfahren und ip-basiertes kommunikationssystem zum wechseln von verbindungs-steuerungsinstanzen ohne neuregistrierung von endteilnehmern | |
DE102006002892A1 (de) | Verfahren, System, Computerprogramm, Datenträger und Computerprogramm-Produkt zum Übertragen von Mediendaten eines Multicast-Dienstes | |
EP1468520B1 (de) | Verfahren zur datenverkehrssicherung in einer mobilen netzumgebung | |
EP3955511B1 (de) | Gesicherte datenübertragung innerhalb eines qkd-netzwerkknotens | |
DE60219915T2 (de) | Verfahren zur Sicherung von Kommunikationen in einem Computersystem | |
DE102022002973B3 (de) | Verfahren zur verschlüsselten Übermittlung von Daten | |
EP2101468B1 (de) | Einbeziehung von Signalisierungsinformationen in ein Schlüsselmanagementprotokoll für den sicheren Medientransport | |
DE10325816B4 (de) | Infrastruktur für öffentliche Schlüssel für Netzwerk-Management | |
DE10356091A1 (de) | Verfahren zur Sicherung des Datenverkehrs zwischen einem Mobilfunknetz und einem IMS-Netz | |
DE10255618A1 (de) | Verfahren zur Datenverkehrssicherung in einer mobilen Netzumgebung | |
WO2005013551A1 (de) | Verfahren und sicherheitssystem zum erkennen einer unverfälschten teilnehmer-identität bei einem empfänger | |
CH698115B1 (de) | Verfahren und Vorrichtung zur Erbringung von temporal authentifizierten Versand- und Empfangsbestätigungen in einem elektronischen Nachrichtenvermittlungssystem. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780035953.X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07820477 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2007820477 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007820477 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12311358 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2009529672 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097008709 Country of ref document: KR |