WO2012141556A2 - Machine-to-machine node erase procedure - Google Patents
Machine-to-machine node erase procedure Download PDFInfo
- Publication number
- WO2012141556A2 WO2012141556A2 PCT/KR2012/002876 KR2012002876W WO2012141556A2 WO 2012141556 A2 WO2012141556 A2 WO 2012141556A2 KR 2012002876 W KR2012002876 W KR 2012002876W WO 2012141556 A2 WO2012141556 A2 WO 2012141556A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- erase
- gateway
- token
- hash
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Definitions
- the present invention relates to a Machine-to-Machine (M2M) Bootstrap Procedure. More particularly, the present invention relates to an M2M Bootstrap Procedure that authenticates an M2M Device/Gateway with an M2M Service Provider, and allows the M2M Device/Gateway to download service parameters that are needed for utilizing the M2M service, such as a long-term M2M Service Root key (Kmr), IP address of network servers (e.g., M2M Network Node, device management server, etc.), etc.
- M2M Machine-to-Machine
- FIG. 1 depicts network elements involved in the M2M Bootstrap and M2M Connection Procedures according to the related art.
- the lines connecting the network elements show the communication interfaces used among them.
- Device is the entity seeking to get bootstrapped in order to start using the M2M facilities provided by the M2M Core network.
- Device engages in bootstrap procedure with an M2M Service Bootstrapping Function (MSBF) via the Core network.
- MSBF M2M Service Bootstrapping Function
- Kmr root secret key
- MAS M2M service layer AAA Server
- the device goes through the Connection Procedure with the MAS via the Core network.
- M2M bootstrap state i.e., service subscription
- Full management of such state requires not only creation of the state but also the deletion of the state by the involved parties. So, a Device/Gateway, an MAS, and an M2M Service Bootstrapping Function (MSBF) shall be able to erase a bootstrap state. Otherwise, a Device/Gateway that bootstrapped with a given service provider stays in that state forever.
- MSBF M2M Service Bootstrapping Function
- a Device/Gateway decides to leave the service (e.g., switching from one service provider to another), or the service provider decides to remove the Device/Gateway from its subscriber base (e.g., unpaid bill, decommissioned device, etc.). Unless these actions are performed with state coordination on both sides, it can create ghost state and wasteful procedures (e.g., service provider trying to access a Device/Gateway that has left its service without notice).
- a method for erasing bootstrapping, at a device or a gateway in an M2M service includes receiving an erase request containing an M2M-Erase-Token from an MAS or an MSBF, processing the erase request based on the M2M-Erase-Token of the erase request or a local policy of the device or the gateway, and sending an erase response containing an M2M-Erase-Token to the MAS or the MSBF.
- a device or a gateway for erasing bootstrapping in an M2M service includes a transceiver for communicating signals with an MAS or an MSBF, and a controller for receiving an erase request containing an M2M-Erase-Token from an MAS or an MSBF, for processing the erase request based on the M2M-Erase-Token of the erase request or a local policy of the device or the gateway, and for sending a erase response containing an M2M-Erase-Token to the MAS or the MSBF.
- an aspect of the present invention is to provide a method for erasing bootstrapping when a Device/Gateway decides to leave the M2M service or the service provider decides to remove the Device/Gateway from its subscriber base.
- Another aspect of the present invention is to provide a method for Erase Procedure for being initiated by either the Device/Gateway, or a network element such as an M2M Service Bootstrap Function (MSBF) or an M2M Authentication Server (MAS).
- MSBF M2M Service Bootstrap Function
- MAS M2M Authentication Server
- aspects of the present invention applies to M2M systems whether they use automated bootstrapping of the M2M Devices/Gateways, or they rely on pre-provisioning (e.g., during manufacturing time). Aspects of the present invention are agnostic to the methods used as the bootstrap and connection procedures (e.g., PANA, TLS, GBA). It can be used no matter what method is used for creating the M2M state.
- FIG. 1 depicts network elements for Machine-to-Machine (M2M) Bootstrap and Connection Procedures according to the related art
- FIG. 2 depicts a call flow for an M2M Service Bootstrapping Function (MSBF)-initiated Erase Procedure according to an exemplary embodiment of the present invention
- FIG. 3 depicts a call flow for an M2M Authentication Server (MAS)-initiated Erase Procedure according to an exemplary embodiment of the present invention
- FIG. 4 depicts a call flow for Device/Gateway-initiated Erase with MSBF Procedure according to an exemplary embodiment of the present invention
- FIG. 5 depicts a call flow for a Device/Gateway-initiated Erase with MAS Procedure according to an exemplary embodiment of the present invention
- FIGs. 6A and 6B are a Flowchart for request/response processing according to an exemplary embodiment of the present invention.
- an Erase Procedure may be initiated by either the Device/Gateway, or a network element such as an M2M Service Bootstrap Function (MSBF) or an M2M Authentication Server (MAS). According to exemplary embodiments of the present invention, no other network element initiates this procedure.
- MSBF M2M Service Bootstrap Function
- MAS M2M Authentication Server
- the Erase Procedure When the Erase Procedure is initiated by the Device/Gateway, the Erase Procedure may be directed towards either the MSBF or the MAS. This invention covers both possibilities. Which one is used is a decision left to the architectures and deployments using these schemes.
- the procedure When initiated by any of these aforementioned elements, the procedure provides origin authentication, integrity and replay protection so that it cannot be exploited for denial-of service attacks by unauthorized elements.
- FIG. 2 depicts a call flow for an MSBF-initiated Erase Procedure of Example 1 according to an exemplary embodiment of the present invention.
- the MSBF initiates the M2M Bootstrap Procedure in step 210.
- the Erase Procedure it is assumed that the Device/Gateway and the MSBF has already executed the Bootstrap Procedure.
- This procedure may involve an intermediary, such as Network M2M Node, or not.
- the Device/Gateway and the MSBF end up sharing a secret key called Kmr.
- Kmr secret key
- additional keying material may also be present on these end-points (e.g., Extensible Master Session Key (EMSK) when EAP protocol is used).
- EMSK Extensible Master Session Key
- the MSBD sends an Erase Request to the Device/Gateway.
- This request may be relayed to the Device/Gateway via an intermediary, such as Network M2M Node (as illustrated in FIG. 1), or directly sent to the Device/Gateway.
- the decision to initiate the Erase Procedure belongs to the MSBF, and the details of the decision-making process are outside the scope of this description.
- the Erase Request contains a payload called Erase Token. This token conveys the intent of the sender along with the cryptographic proof about the authentication and integrity of the token.
- Erase Token contains the following information elements, and may also include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node that will be erased.
- This information element contains the index of the shared secret key (e.g., Kmr index (IKmr)). Such indices are used when there may be multiple instances of the same key. Each instance distinguished from the others with the help of a key index. This information element may be included only when the key used for the hash function has an index value, and may be omitted otherwise.
- Kmr index IKmr index
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of request. When variations of erase procedure are needed, this Type can help differentiating among them.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- the Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MSBF.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either.
- Additional parameters may be added to the formula. If no such parameters are needed, then the “
- the Erase Request may be sent over one of many different protocols, such as PANA (in the form of a PANA AVP, which may be carried over PANA Termination Request or another PANA Request packet), Diameter/RADIUS (in the form of an AVP/attribute), HTTP, etc.
- PANA in the form of a PANA AVP
- Diameter/RADIUS in the form of an AVP/attribute
- HTTP etc.
- step 230 the Device/Gateway receives the Erase Request.
- the intermediary receives the Erase Request from MSBF and relays the Erase Request to the Device/Gateway.
- the intermediary may have to deal with two different kinds of protocols carrying the request on both sides.
- the MSBF-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be omitted and the request message may be directly sent from the MSBF to the Device/Gateway.
- step 240 the Device/Gateway receives and processes the Erase Request.
- the Device/Gateway verifies the hash before accepting the request as authentic.
- the Device/Gateway retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching secret key, then the Device/Gateway shall ignore the Erase Request.
- the matching key is used with the same formula as in step 220 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the Device/Gateway ignores the Erase Request. If the Hash is a match, then the Device/Gateway accepts this incoming Erase Request as valid.
- the Device/Gateway makes a decision on how to process the Erase Request based on its local policy. For example, a Device/Gateway may be permanently configured to reject such requests. If the Device/Gateway accepts the Erase Request, then the Device/Gateway deletes its bootstrapped state after sending the Erase Response back. The Device/Gateway may put a delay before deleting such state, in case the Erase Response is not received by the MSBF and the MSBF retransmits the Erase Request (whose processing may require the state be present).
- the Device/Gateway sends an Erase Response to the MSBF.
- This response may be sent via an intermediary such as Network M2M Node.
- Erase Response shall include an Erase Token.
- the Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node being erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element is included only when the key used for the hash function has an index value, omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of response. It can indicate values corresponding to “Successfully erased”, “Erase rejected due to local policy”, etc.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MSBF.
- the Secret-key be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either.
- Additional parameters may be added to the formula. If no such parameters are needed, then the “
- step 250 the Erase Response is sent over the same protocol that carried the Erase Request.
- the intermediary receives the Erase Response from Device/Gateway and relays it to MSBF.
- the intermediary may have to deal with two different kinds of protocols carrying the response on both sides.
- the MSBF-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be eliminated and the response message may be directly sent from the Device/Gateway to the MSBF.
- the MSBF When the MSBF receives the Erase Response, the MSBF verifies the hash before accepting the response as authentic. The MSBF retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching key, then the MSBF shall ignore the Erase Response.
- the matching key is used with the same formula as in step 240 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the MSBF shall ignore the Erase Response.
- the MSBF accepts this incoming Erase Response as valid.
- the MSBF decides what to do with the bootstrapped state associated with the Device/Gateway based on the received Type and its local policy.
- FIG. 3 depicts the call flow for MAS-initiated Erase Procedure of Example 3 according to an exemplary embodiment of the present invention.
- the MAS determines to initiate the M2M Service Connect Procedure in step 310.
- the Erase Procedure it is assumed that the Device/Gateway and the MAS have already executed the Service Connect Procedure.
- This procedure may involve an intermediary, such as a Network M2M Node, or not.
- Kmr a secret key
- additional keying material may also be present on these end-points (e.g., Extensible Master Session Key (EMSK) when EAP protocol is used).
- EMSK Extensible Master Session Key
- the MAS When the MAS decides to initiate the Erase Procedure, the MAS sends an Erase Request to the Device/Gateway in step 320. This request may be relayed to the Device/Gateway via an intermediary, such as Network M2M Node (as illustrated in FIG. 1), or directly sent to the Device/Gateway.
- the decision to initiate the Erase Procedure belongs to the MAS and the details of how the MAS determines whether to initiate the Erase Procedure are outside the scope of this description.
- the Erase Request contains a payload called an Erase Token.
- This token conveys the intent of the sender along with the cryptographic proof about the authentication and integrity of the token.
- the Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node that will be erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element may be included only when the key used for the hash function has an index value, and may be omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of request. When variations of erase procedure are needed, this Type can help differentiate among them.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MAS.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation.
- Additional parameters may be added to the formula. If no such parameters are needed, then the “
- the Erase Request may be sent over one of many different protocols, such as PANA (in the form of a PANA AVP, which may be carried over PANA Termination Request or another PANA Request packet), Diameter/RADIUS (in the form of an AVP/attribute), HTTP, etc.
- PANA in the form of a PANA AVP
- Diameter/RADIUS in the form of an AVP/attribute
- HTTP etc.
- the Device/Gateway receives the Erase Request.
- the intermediary receives the Erase Request from MAS and relays the Erase Request to the Device/Gateway.
- the intermediary may have to deal with two different kinds of protocols carrying the request on both sides.
- the MAS-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be eliminated and the request message may be directly sent from the MAS to the Device/Gateway.
- step 340 the Device/Gateway receives and processes the Erase Request.
- the Device/Gateway verifies the hash before accepting the request as authentic.
- the Device/Gateway retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching secret key, then the Device/Gateway ignores the Erase Request.
- the matching key is be used with the same formula as in step 320 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the Device/Gateway ignores the Erase Request. If the Hash is a match, then the Device/Gateway accepts the incoming Erase Request as valid.
- the Device/Gateway makes a decision on how to process the Erase Request based on its local policy. For example, a Device/Gateway may be permanently configured to reject such requests. If the Device/Gateway accepts the Erase Request, then the Device/Gateway should delete its bootstrapped state after sending the Erase Response back. The Device/Gateway may put a delay before deleting such state, in case the Erase Response is not received by the MAS and the MAS retransmits the Erase Request (whose processing requires the state be present).
- the Device/Gateway sends an Erase Response to the MAS.
- This response may be sent via an intermediary such as Network M2M Node.
- Erase Response shall include an Erase Token.
- Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node being erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element may be included only when the key used for the hash function has an index value, omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of response. It can indicate values corresponding to “Successfully erased”, “Erase rejected due to local policy”, etc.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MAS.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either.
- Additional parameters may be added to the formula. If no such parameters are needed, then the “
- step 350 the Erase Response is sent over the same protocol that carried the Erase Request.
- the intermediary receives the Erase Response from Device/Gateway and relays the Erase Response to MAS.
- the intermediary may have to deal with two different kinds of protocols carrying the response on both sides.
- the MAS-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be omitted and the response message may be directly sent from the Device/Gateway to the MAS.
- the MAS When the MAS receives the Erase Response, the MAS verifies the hash before accepting the response as authentic. The MAS retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching key, then the MAS ignores the Erase Response.
- the matching key is be used with the same formula as in step 340 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the MAS ignores the Erase Response.
- the MAS accepts the incoming Erase Response as valid.
- the MAS decides what to do with the bootstrapped state associated with the Device/Gateway based on the received Type and its local policy.
- FIG. 4 depicts a call flow for a Device/Gateway-initiated Erase with MSBF Procedure according to an exemplary embodiment of the present invention.
- step 410 the Device/Gateway initiates the M2M Bootstrap Procedure.
- the Erase Procedure it is assumed that the Device/Gateway and the MSBF has already executed the Bootstrap Procedure.
- This procedure may involve an intermediary, such as Network M2M Node, or not.
- the Device/Gateway and the MSBF end up sharing a secret key called Kmr.
- Kmr secret key
- additional keying material may also be present on these end-points (e.g., Extensible Master Session Key (EMSK) when EAP protocol is used).
- EMSK Extensible Master Session Key
- the Device/Gateway When the Device/Gateway decides to initiate the Erase Procedure, the Device/Gateway sends an Erase Request to the MSBF in step 420. This request may be relayed to the MSBF via an intermediary, such as Network M2M Node (as illustrated in FIG. 1), or directly sent to the MSBF.
- the decision to initiate the Erase Procedure is made by the Device/Gateway and the details are outside the scope of this description.
- the Erase Request contains a payload called Erase Token. This token conveys the intent of the sender along with the cryptographic proof about the authentication and integrity of the token.
- the Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node that will be erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element may be included only when the key used for the hash function has an index value, omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of request. When variations of erase procedure are needed, this Type can help differentiate among them.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MSBF.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either. Additional parameters (shown as “Other parameters” in the formula) may be added to the formula. If no such parameters are needed, then the “
- the Erase Request may be sent over one of many different protocols, such as PANA (in the form of a PANA AVP, which may be carried over PANA Termination Request or another PANA Request packet), Diameter/RADIUS (in the form of an AVP/attribute), HTTP, etc.
- PANA in the form of a PANA AVP
- Diameter/RADIUS in the form of an AVP/attribute
- HTTP etc.
- the Device/Gateway receives the Erase Request.
- the intermediary receives the Erase Request from Device/Gateway and relays the Erase Request to the MSBF.
- the intermediary may have to deal with two different kinds of protocols carrying the request on both sides.
- the MSBF-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be omitted and the request message may be directly sent from the Device/Gateway to the MSBF.
- step 440 the MSBF receives and processes the Erase Request.
- the MSBF verifies the hash before accepting the request as authentic.
- the MSBF retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching secret key, then the MSBF ignores the Erase Request.
- the matching key used with the same formula as in step 420 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the MSBF shall ignore the Erase Request.
- the MSBF accepts the incoming Erase Request as valid.
- the MSBF makes a decision on how to process the Erase Request based on its local policy. For example, an MSBF may be permanently configured to reject such requests. If the MSBF accepts the Erase Request, then the MSBF deletes the Device/Gateway’s bootstrapped state after sending the Erase Response back. The MSBF may put a delay before deleting such state, in case the Erase Response is not received by the Device/Gateway and the Device/Gateway retransmits the Erase Request (whose processing requires the state be present).
- MSBF sends an Erase Response to the Device/Gateway.
- This response may be sent via an intermediary such as Network M2M Node.
- Erase Response includes an Erase Token.
- the Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node being erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element is included only when the key used for the hash function has an index value, omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of response.
- the type may indicate values corresponding to “Successfully erased”, “Erase rejected due to local policy”, etc.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MSBF.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either. Additional parameters (shown as “Other parameters” in the formula) may be added to the formula. If no such parameters are needed, then the “
- step 450 the Erase Response is sent over the same protocol that carried the Erase Request.
- the intermediary receives the Erase Response from MSBF and relays the Erase Response to the Device/Gateway.
- the intermediary may have to deal with two different kinds of protocols carrying the response on both sides.
- the MSBF-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be omitted and the response message can be directly sent from the MSBF to the Device/Gateway.
- the Device/Gateway When the Device/Gateway receives the Erase Response, the Device/Gateway verifies the hash before accepting the response as authentic. The Device/Gateway retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching key, then the Device/Gateway ignores the Erase Response.
- the matching key may be used with the same formula as in step 440 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the Device/Gateway shall ignore the Erase Response.
- the Device/Gateway accepts this incoming Erase Response as valid. Device/Gateway decides what to do with the bootstrapped state associated with itself based on the received Type and its local policy.
- FIG. 5 depicts a call flow for a Device/Gateway-initiated Erase with MAS Procedure according to an exemplary embodiment of the present invention.
- step 510 the Device/Gateway initiates the M2M Service Connect Procedure.
- the Erase Procedure For the Erase Procedure to take place, it is assumed that the Device/Gateway and the MAS has already executed the Service Connect Procedure. This procedure may involve an intermediary, such as Network M2M Node, or not.
- Kmr a secret key
- additional keying material may also be present on these end-points (e.g., Extensible Master Session Key (EMSK) when EAP protocol is used).
- EMSK Extensible Master Session Key
- the Device/Gateway When the Device/Gateway decides to initiate the Erase Procedure, the Device/Gateway sends an Erase Request to the MAS in step 520. This request may be relayed to the MAS via an intermediary, such as Network M2M Node (as illustrated in FIG. 1), or directly sent to the MAS.
- the decision to initiate the Erase Procedure belongs to the Device/Gateway and the details are outside the scope of this description.
- the Erase Request contains a payload called Erase Token. This token conveys the intent of the sender along with the cryptographic proof about the authentication and integrity of the token.
- Erase Token contains the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node that will be erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element may be included only when the key used for the hash function has an index value, and may be omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of request. When variations of erase procedure are needed, this Type may help differentiate among them.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity, and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MAS.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either. Additional parameters (shown as “Other parameters” in the formula) may be added to the formula. If no such parameters are needed, then the “
- the Erase Request may be sent over one of many different protocols, such as PANA (in the form of a PANA AVP, which may be carried over PANA Termination Request or another PANA Request packet), Diameter/RADIUS (in the form of an AVP/attribute), HTTP, etc.
- PANA in the form of a PANA AVP
- Diameter/RADIUS in the form of an AVP/attribute
- HTTP etc.
- the MAS receives the Erase Request.
- the intermediary receives the Erase Request from Device/Gateway and relay the Erase Request to the MAS.
- the intermediary may have to deal with two different kinds of protocols carrying the request on both sides.
- the MAS-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be eliminated and the request message may be directly sent from the Device/Gateway to the MAS.
- the MAS receives and processes the Erase Response.
- the MAS shall verify the hash before accepting the request as authentic.
- the MAS retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching secret key, then the MAS ignores the Erase Request.
- the matching key is used with the same formula as in Step 520 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the MAS ignores the Erase Request. If the Hash is a match, then the MAS accepts the incoming Erase Request as valid.
- the MAS makes a decision on how to process the Erase Request based on its local policy. For example, an MAS may be permanently configured to reject such requests. If the MAS accepts the Erase Request, then it should delete the Device/Gateway’s bootstrapped state after sending the Erase Response back. The MAS may put a delay before deleting such state, in case the Erase Response is not received by the Device/Gateway and the Device/Gateway retransmits the Erase Request (whose processing requires the state be present).
- the MAS sends an Erase Response to the Device/Gateway.
- This response may be sent via an intermediary such as Network M2M Node.
- Erase Response includes an Erase Token.
- the Erase Token may contain the following information elements, and may include additional elements.
- M2M Node ID This information element contains the identifier of the Device/Gateway M2M Node being erased.
- This information element contains the index of the shared secret key (e.g., Kmr index). Such indices are used when there may be multiple instances of the same key. Each instance is distinguished from the others with the help of a key index. This information element is included only when the key used for the hash function has an index value, omitted otherwise.
- Kmr index the index of the shared secret key
- This information element contains a number generated by the sender.
- the sender ensures that the same nonce value is not used with the same secret key value before, either by itself or by the other end-point.
- the value may be generated randomly, sequentially, or by any other pattern.
- This information element contains a value that indicates the type of response.
- the Type may indicate values corresponding to “Successfully erased”, “Erase rejected due to local policy”, etc.
- Hash This information element contains a cryptographically generated hash value in order to provide origin authentication, integrity and replay protection for the Erase Token.
- Hash Hash-function (Secret-key, M2M Node ID
- ” indicates concatenation.
- Hash-function is a one-way keyed hash function, for example HMAC-SHA256.
- Secret-key is a secret key shared between the Device/Gateway and the MAS.
- the Secret-key may be Kmr, EMSK, or another shared secret key. Such variations of this formula are valid.
- M2M Node ID, Key Index, Nonce, and Type are the values of the aforementioned information elements. When any of these information elements are not present in the token, they are not included in the hash computation either. Additional parameters (shown as “Other parameters” in the formula) may be added to the formula. If no such parameters are needed, then the “
- step 550 the Erase Response is sent over the same protocol that carried the Erase Request.
- the intermediary receives the Erase Response from MAS and relays the request to the Device/Gateway.
- the intermediary may have to deal with two different kinds of protocols carrying the response on both sides.
- the MAS-facing side may be using RADIUS and the Device/Gateway-facing side may be using PANA.
- the intermediary may be omitted and the response message may be directly sent from the MAS to the Device/Gateway.
- the Device/Gateway When the Device/Gateway receives the Erase Response, the Device/Gateway verifies the hash before accepting the response as authentic. The Device/Gateway retrieves the Secret-key by using the M2M Node ID and Key index (when present) for a look up from its local key repository. If there is no matching key, then the Device/Gateway ignores the Erase Response.
- the matching key is used with the same formula as in step 540 in order to generate a Hash value. If the computed Hash does not match the Hash value in the Erase Request, then the Device/Gateway ignores the Erase Response.
- the Device/Gateway accepts this incoming Erase Response as valid.
- the Device/Gateway decides what to do with the bootstrapped state associated with itself based on the received Type and its local policy.
- FIGs. A and 6B depict processing of request and response messages in the form of flowcharts according to an exemplary embodiment of the present invention.
- Request receiver is the entity that receives the Erase Request (e.g., MSBF and MAS in the case of Device/Gateway initiated Erase Procedure).
- Response receiver is the entity that sends the request and receives the response (e.g., Device/Gateway in the case of Device/Gateway initiated Erase Procedure).
- Exemplary embodiments of the present invention are applicable to M2M systems whether they use automated bootstrapping of the M2M Devices/Gateways, or they rely on pre-provisioning (e.g., during manufacturing time). According to exemplary embodiments of the present invention, any method may be used as the bootstrap and connection procedures (e.g., PANA, TLS, GBA). Exemplary embodiments of the present invention may be employed no matter what method is used for creating the M2M state.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Communication Control (AREA)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2014505088A JP6370215B2 (ja) | 2011-04-15 | 2012-04-16 | マシン−対−マシンノード消去手順 |
| EP12771806.2A EP2697916A4 (en) | 2011-04-15 | 2012-04-16 | MACHINE-TO-MACHINE KNOT EXTINGUISHING METHODS |
| KR1020137030300A KR101981229B1 (ko) | 2011-04-15 | 2012-04-16 | 머신-대-머신 노드 소거 절차 |
| EP19171979.8A EP3537741B1 (en) | 2011-04-15 | 2012-04-16 | Machine-to-machine node erase procedure |
| CN201280029216.XA CN103703698B (zh) | 2011-04-15 | 2012-04-16 | 机器对机器节点擦除程序 |
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161475972P | 2011-04-15 | 2011-04-15 | |
| US61/475,972 | 2011-04-15 | ||
| US201161485275P | 2011-05-12 | 2011-05-12 | |
| US61/485,275 | 2011-05-12 | ||
| US201161544577P | 2011-10-07 | 2011-10-07 | |
| US61/544,577 | 2011-10-07 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2012141556A2 true WO2012141556A2 (en) | 2012-10-18 |
| WO2012141556A3 WO2012141556A3 (en) | 2013-03-14 |
Family
ID=47007296
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2012/002876 Ceased WO2012141556A2 (en) | 2011-04-15 | 2012-04-16 | Machine-to-machine node erase procedure |
| PCT/KR2012/002874 Ceased WO2012141555A2 (en) | 2011-04-15 | 2012-04-16 | Method and apparatus for providing machine-to-machine service |
| PCT/KR2012/002877 Ceased WO2012141557A2 (en) | 2011-04-15 | 2012-04-16 | Method and apparatus for providing machine-to-machine service |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2012/002874 Ceased WO2012141555A2 (en) | 2011-04-15 | 2012-04-16 | Method and apparatus for providing machine-to-machine service |
| PCT/KR2012/002877 Ceased WO2012141557A2 (en) | 2011-04-15 | 2012-04-16 | Method and apparatus for providing machine-to-machine service |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US9202055B2 (enExample) |
| EP (6) | EP3537741B1 (enExample) |
| JP (3) | JP6022539B2 (enExample) |
| KR (3) | KR101981229B1 (enExample) |
| CN (3) | CN103703698B (enExample) |
| WO (3) | WO2012141556A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014182674A1 (en) * | 2013-05-06 | 2014-11-13 | Convida Wireless LLC | Machine-to-machine bootstrapping |
Families Citing this family (54)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102209396B (zh) * | 2010-03-31 | 2014-01-22 | 华为技术有限公司 | 终端设备在网络中附着的方法、网元设备及网络系统 |
| US9209980B2 (en) * | 2011-06-21 | 2015-12-08 | Blackberry Limited | Provisioning a shared secret to a portable electronic device and to a service entity |
| US9253621B2 (en) | 2012-05-18 | 2016-02-02 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for associating service provider network identifiers with access network identifiers |
| US9445399B2 (en) | 2012-05-25 | 2016-09-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for associating service provider network identifiers with access network identifiers |
| US9497567B2 (en) | 2012-06-22 | 2016-11-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Selection of M2M devices by external triggering |
| US9166958B2 (en) * | 2012-07-17 | 2015-10-20 | Texas Instruments Incorporated | ID-based control unit-key fob pairing |
| CN103685210B (zh) * | 2012-09-26 | 2018-02-13 | 中兴通讯股份有限公司 | 终端的注册方法及装置 |
| KR102045905B1 (ko) * | 2012-11-05 | 2019-11-18 | 주식회사 케이티 | 단말 이동성 제공을 위한 단말 어플리케이션 등록 방법 및 그 장치 |
| KR20150088787A (ko) * | 2012-11-05 | 2015-08-03 | 엘지전자 주식회사 | 무선 통신 시스템에서 특정 리소스에 대한 정보 갱신을 위한 방법 및 장치 |
| KR102045907B1 (ko) * | 2012-11-23 | 2019-12-02 | 주식회사 케이티 | 응용 식별 정보와 서비스 제공 능력 식별 정보의 연계 방법 및 그 장치 |
| WO2014109597A1 (ko) * | 2013-01-11 | 2014-07-17 | 엘지전자 주식회사 | M2m(machine-to-machine)시스템에서 게이트웨이 변경 방법 및 이를 위한 장치 |
| JP6473697B2 (ja) * | 2013-02-07 | 2019-02-20 | アイオーティー ホールディングス インコーポレイテッド | RESTfulバッチサービスのための方法および装置 |
| EP2995099B1 (en) * | 2013-05-06 | 2019-07-10 | Convida Wireless, LLC | Device triggering |
| WO2014190186A1 (en) | 2013-05-22 | 2014-11-27 | Convida Wireless, Llc | Network assisted bootstrapping for machine-to-machine communication |
| CN109769227B (zh) | 2013-07-25 | 2022-02-22 | 康维达无线有限责任公司 | 端到端m2m服务层会话 |
| US9392446B1 (en) | 2013-08-05 | 2016-07-12 | Sprint Communications Company L.P. | Authenticating environmental sensor systems based on security keys in communication systems |
| CN105917619A (zh) * | 2014-01-17 | 2016-08-31 | 高通股份有限公司 | 在通信网络中转发消息 |
| CN106471465B (zh) * | 2014-04-09 | 2019-10-22 | 康维达无线有限责任公司 | 服务启用器功能 |
| US20150341241A1 (en) * | 2014-05-23 | 2015-11-26 | Verizon Patent And Licensing Inc. | Method and apparatus for specifying machine identifiers for machine-to-machine platform support |
| JP2016063538A (ja) * | 2014-09-12 | 2016-04-25 | 日本放送協会 | 送信装置および受信装置 |
| US9544395B2 (en) | 2014-10-10 | 2017-01-10 | At&T Intellectual Property I, L.P. | Facilitating quality of service and security via functional classification of devices in networks |
| US9838258B2 (en) | 2014-12-04 | 2017-12-05 | At&T Intellectual Property I, L.P. | Network service interface for machine-to-machine applications |
| DE102015000662B3 (de) | 2015-01-23 | 2016-06-09 | Jenoptik Laser Gmbh | Laseranordnung mit Hilfsring |
| JP6545966B2 (ja) | 2015-01-27 | 2019-07-17 | ルネサスエレクトロニクス株式会社 | 中継装置、端末装置および通信方法 |
| US9681473B2 (en) * | 2015-05-29 | 2017-06-13 | Huawei Technologies Co., Ltd. | MTC service management using NFV |
| US10104522B2 (en) * | 2015-07-02 | 2018-10-16 | Gn Hearing A/S | Hearing device and method of hearing device communication |
| US10129235B2 (en) * | 2015-10-16 | 2018-11-13 | Qualcomm Incorporated | Key hierarchy for network slicing |
| US9826386B2 (en) * | 2015-10-27 | 2017-11-21 | Verizon Patent And Licensing Inc. | Configuring a machine-to-machine modem |
| US10524244B2 (en) | 2016-05-11 | 2019-12-31 | Convida Wireless, Llc | Radio PDCCH to facilitate numerology operations |
| US10104567B2 (en) | 2016-05-31 | 2018-10-16 | At&T Intellectual Property I, L.P. | System and method for event based internet of things (IOT) device status monitoring and reporting in a mobility network |
| CN114727424A (zh) | 2016-06-15 | 2022-07-08 | 康维达无线有限责任公司 | 用于新无线电的无许可上行链路传输 |
| US10592669B2 (en) | 2016-06-23 | 2020-03-17 | Vmware, Inc. | Secure booting of computer system |
| WO2018009828A1 (en) | 2016-07-08 | 2018-01-11 | Vid Scale, Inc. | Systems and methods for region-of-interest tone remapping |
| US10242196B2 (en) * | 2016-07-29 | 2019-03-26 | Vmware, Inc. | Secure booting of computer system |
| KR20190039223A (ko) | 2016-08-11 | 2019-04-10 | 콘비다 와이어리스, 엘엘씨 | 뉴 라디오를 위한 유연한 프레임 구조에서의 빔포밍 스위핑 및 트레이닝 |
| EP3306970A1 (en) * | 2016-10-07 | 2018-04-11 | Giesecke+Devrient Mobile Security GmbH | Lpwa communication system key management |
| CN115632686A (zh) | 2016-11-03 | 2023-01-20 | 康维达无线有限责任公司 | Nr中的帧结构 |
| US20180159828A1 (en) * | 2016-12-06 | 2018-06-07 | Ingenu | Multi-regional provisioning |
| WO2018152437A1 (en) | 2017-02-17 | 2018-08-23 | Vid Scale, Inc. | Systems and methods for selective object-of-interest zooming in streaming video |
| EP3370386B1 (en) * | 2017-03-03 | 2019-05-15 | The Boeing Company | A system and a computer-implemented method for machine-to-machine authentication of an apparatus |
| US10298581B2 (en) | 2017-04-28 | 2019-05-21 | Cisco Technology, Inc. | Zero-touch IoT device provisioning |
| JP7227919B2 (ja) * | 2017-06-16 | 2023-02-22 | クリプトグラフィ リサーチ, インコーポレイテッド | モノのインターネット(iot)デバイスの管理 |
| US11096058B2 (en) | 2017-08-30 | 2021-08-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Reconfiguration of communications devices |
| US10574654B1 (en) * | 2017-11-07 | 2020-02-25 | United Services Automobile Asociation (USAA) | Segmentation based network security |
| US10162968B1 (en) * | 2017-11-30 | 2018-12-25 | Mocana Corporation | System and method for securely updating a registered device using a development system and a release management system operated by an update provider and an update publisher |
| US11871451B2 (en) | 2018-09-27 | 2024-01-09 | Interdigital Patent Holdings, Inc. | Sub-band operations in unlicensed spectrums of new radio |
| WO2020117549A1 (en) | 2018-12-06 | 2020-06-11 | Mocana Corporation | System and method for zero touch provisioning of iot devices |
| US11012425B2 (en) * | 2018-12-28 | 2021-05-18 | Micron Technology, Inc. | Replay protection nonce generation |
| KR102624642B1 (ko) * | 2019-03-18 | 2024-01-12 | 주식회사 케이티 | M2m 시스템에서 라이프타임 갱신 방법 및 그 장치 |
| US20210297853A1 (en) * | 2020-03-17 | 2021-09-23 | Qualcomm Incorporated | Secure communication of broadcast information related to cell access |
| US11375042B2 (en) | 2020-07-10 | 2022-06-28 | Kyndryl, Inc. | Symphonizing serverless functions of hybrid services |
| US12355754B2 (en) | 2020-07-14 | 2025-07-08 | Honeywell International Inc. | Building management system architecture |
| TW202243604A (zh) | 2021-05-06 | 2022-11-16 | 瑞士商傑太日煙國際股份有限公司 | 用於具有至少一個液體噴射裝置的吸入裝置之容器、至少兩個容器之組合件以及將液體輸送至吸入裝置之方法 |
| US11941266B2 (en) | 2021-10-20 | 2024-03-26 | Samsung Electronics Co., Ltd. | Resource isolation in computational storage devices |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011112683A1 (en) | 2010-03-09 | 2011-09-15 | Interdigital Patent Holdings, Inc. | Method and apparatus for supporting machine-to-machine communications |
Family Cites Families (46)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
| US7349538B2 (en) * | 2002-03-21 | 2008-03-25 | Ntt Docomo Inc. | Hierarchical identity-based encryption and signature schemes |
| EP1634421A1 (en) * | 2003-06-18 | 2006-03-15 | Telefonaktiebolaget LM Ericsson (publ) | Method, system and apparatus to support mobile ip version 6 services |
| US20050138355A1 (en) * | 2003-12-19 | 2005-06-23 | Lidong Chen | System, method and devices for authentication in a wireless local area network (WLAN) |
| JP2005260358A (ja) * | 2004-03-09 | 2005-09-22 | Matsushita Electric Ind Co Ltd | 通信システムならびにそれに用いられる通信端末、認証情報削除方法、認証情報削除プログラムおよび認証情報削除プログラムを格納する記録媒体 |
| US7336960B2 (en) * | 2004-10-26 | 2008-02-26 | Cisco Technology, Inc. | Method and apparatus for balancing wireless access based on centralized information |
| JP4357562B2 (ja) | 2005-02-21 | 2009-11-04 | 富士通株式会社 | 通信制御システム |
| KR100704675B1 (ko) * | 2005-03-09 | 2007-04-06 | 한국전자통신연구원 | 무선 휴대 인터넷 시스템의 인증 방법 및 관련 키 생성방법 |
| US20070101122A1 (en) * | 2005-09-23 | 2007-05-03 | Yile Guo | Method and apparatus for securely generating application session keys |
| US7787627B2 (en) * | 2005-11-30 | 2010-08-31 | Intel Corporation | Methods and apparatus for providing a key management system for wireless communication networks |
| US20070143613A1 (en) * | 2005-12-21 | 2007-06-21 | Nokia Corporation | Prioritized network access for wireless access networks |
| US7831237B2 (en) * | 2006-02-03 | 2010-11-09 | Broadcom Corporation | Authenticating mobile network provider equipment |
| CN101039311B (zh) * | 2006-03-16 | 2010-05-12 | 华为技术有限公司 | 一种身份标识网页业务网系统及其鉴权方法 |
| CN100512182C (zh) * | 2006-07-27 | 2009-07-08 | 西安电子科技大学 | 无线局域网中的快速切换方法及系统 |
| DE102006038037A1 (de) * | 2006-08-14 | 2008-02-21 | Siemens Ag | Verfahren und System zum Bereitstellen eines zugangsspezifischen Schlüssels |
| JP4216876B2 (ja) * | 2006-12-21 | 2009-01-28 | 株式会社東芝 | 通信端末を認証する装置、方法およびプログラム |
| US8707416B2 (en) * | 2007-01-19 | 2014-04-22 | Toshiba America Research, Inc. | Bootstrapping kerberos from EAP (BKE) |
| US8356176B2 (en) * | 2007-02-09 | 2013-01-15 | Research In Motion Limited | Method and system for authenticating peer devices using EAP |
| EP1956791A1 (en) * | 2007-02-09 | 2008-08-13 | Research In Motion Limited | Method and system for authenticating peer devices using EAP |
| JP5067621B2 (ja) * | 2007-10-17 | 2012-11-07 | Necカシオモバイルコミュニケーションズ株式会社 | 通信端末装置及びプログラム |
| KR101407573B1 (ko) * | 2007-12-18 | 2014-06-13 | 한국전자통신연구원 | 무선 액세스 기술과 이동ip 기반 이동성 제어 기술이적용된 차세대 네트워크 환경을 위한 통합 핸드오버 인증방법 |
| US20090191857A1 (en) * | 2008-01-30 | 2009-07-30 | Nokia Siemens Networks Oy | Universal subscriber identity module provisioning for machine-to-machine communications |
| CN101499959B (zh) * | 2008-01-31 | 2012-08-08 | 华为技术有限公司 | 配置密钥的方法、装置及系统 |
| US8516133B2 (en) * | 2008-02-07 | 2013-08-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for mobile device credentialing |
| US8407769B2 (en) * | 2008-02-22 | 2013-03-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for wireless device registration |
| US20090217038A1 (en) * | 2008-02-22 | 2009-08-27 | Vesa Petteri Lehtovirta | Methods and Apparatus for Locating a Device Registration Server in a Wireless Network |
| EP2291971B1 (en) * | 2008-06-12 | 2012-02-22 | Telefonaktiebolaget L M Ericsson (PUBL) | Method and apparatus for machine-to-machine communication |
| CN101299666A (zh) * | 2008-06-16 | 2008-11-05 | 中兴通讯股份有限公司 | 密钥身份标识符的生成方法和系统 |
| US8737989B2 (en) | 2008-08-29 | 2014-05-27 | Apple Inc. | Methods and apparatus for machine-to-machine based communication service classes |
| US9084282B2 (en) * | 2008-10-17 | 2015-07-14 | Qualcomm Incorporated | Apparatus and method for providing a portable broadband service using a wireless convergence platform |
| US8788635B2 (en) * | 2009-03-20 | 2014-07-22 | Microsoft Corporation | Mitigations for potentially compromised electronic devices |
| EP2259610B1 (en) * | 2009-06-02 | 2012-08-08 | Vodafone Holding GmbH | Registering a mobile device in a mobile communication network |
| US9590961B2 (en) | 2009-07-14 | 2017-03-07 | Alcatel Lucent | Automated security provisioning protocol for wide area network communication devices in open device environment |
| KR20110048974A (ko) * | 2009-11-04 | 2011-05-12 | 삼성전자주식회사 | 무선통신 시스템에서 마스터 세션 키를 갱신하기 위한 장치 및 방법 |
| US8839372B2 (en) * | 2009-12-23 | 2014-09-16 | Marvell World Trade Ltd. | Station-to-station security associations in personal basic service sets |
| TWI519098B (zh) * | 2009-12-28 | 2016-01-21 | 內數位專利控股公司 | 機器對機器閘道架構 |
| EP2543175B1 (en) * | 2010-03-01 | 2018-05-02 | InterDigital Patent Holdings, Inc. | Machine-to-machine gateway architecture and functionality |
| US8886935B2 (en) * | 2010-04-30 | 2014-11-11 | Kabushiki Kaisha Toshiba | Key management device, system and method having a rekey mechanism |
| US9450928B2 (en) * | 2010-06-10 | 2016-09-20 | Gemalto Sa | Secure registration of group of clients using single registration procedure |
| CN101902681B (zh) * | 2010-07-21 | 2015-05-13 | 中兴通讯股份有限公司 | M2m平台业务处理的方法和m2m平台 |
| US8631466B2 (en) * | 2010-08-03 | 2014-01-14 | Interdigital Patent Holdings, Inc. | Machine to-machine (M2M) call flow security |
| US8650619B2 (en) * | 2010-08-19 | 2014-02-11 | Alcatel Lucent | Method and apparatus of automated discovery in a communication network |
| CN103250441A (zh) * | 2010-12-07 | 2013-08-14 | 瑞典爱立信有限公司 | 使用密钥共享方案来提供临时标识模块的方法和装置 |
| US8713589B2 (en) * | 2010-12-23 | 2014-04-29 | Microsoft Corporation | Registration and network access control |
| WO2012119015A1 (en) * | 2011-03-01 | 2012-09-07 | General Instrument Corporation | Providing subscriber consent in an operator exchange |
| WO2012121776A1 (en) * | 2011-03-09 | 2012-09-13 | Joey Chou | Base station and communication method for machine to machine communications |
-
2012
- 2012-04-16 JP JP2014505087A patent/JP6022539B2/ja not_active Expired - Fee Related
- 2012-04-16 KR KR1020137030300A patent/KR101981229B1/ko not_active Expired - Fee Related
- 2012-04-16 JP JP2014505089A patent/JP6066992B2/ja active Active
- 2012-04-16 JP JP2014505088A patent/JP6370215B2/ja not_active Expired - Fee Related
- 2012-04-16 EP EP19171979.8A patent/EP3537741B1/en active Active
- 2012-04-16 EP EP19215392.2A patent/EP3641359B1/en active Active
- 2012-04-16 EP EP12770819.6A patent/EP2697992A4/en not_active Ceased
- 2012-04-16 EP EP12771806.2A patent/EP2697916A4/en not_active Ceased
- 2012-04-16 CN CN201280029216.XA patent/CN103703698B/zh not_active Expired - Fee Related
- 2012-04-16 WO PCT/KR2012/002876 patent/WO2012141556A2/en not_active Ceased
- 2012-04-16 EP EP12770561.4A patent/EP2697933A4/en not_active Ceased
- 2012-04-16 WO PCT/KR2012/002874 patent/WO2012141555A2/en not_active Ceased
- 2012-04-16 EP EP19216075.2A patent/EP3668048B1/en active Active
- 2012-04-16 US US13/447,571 patent/US9202055B2/en active Active
- 2012-04-16 US US13/447,597 patent/US8843753B2/en active Active
- 2012-04-16 KR KR1020137029892A patent/KR102051492B1/ko not_active Expired - Fee Related
- 2012-04-16 KR KR1020137030376A patent/KR101923047B1/ko active Active
- 2012-04-16 CN CN201280029206.6A patent/CN103621126B/zh active Active
- 2012-04-16 WO PCT/KR2012/002877 patent/WO2012141557A2/en not_active Ceased
- 2012-04-16 US US13/447,599 patent/US9317688B2/en active Active
- 2012-04-16 CN CN201280029345.9A patent/CN103597774B/zh not_active Expired - Fee Related
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011112683A1 (en) | 2010-03-09 | 2011-09-15 | Interdigital Patent Holdings, Inc. | Method and apparatus for supporting machine-to-machine communications |
Non-Patent Citations (3)
| Title |
|---|
| SAMSUNG ET AL.: "ETSI", 5 September 2011, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE |
| SAMSUNG: "ETSI", 25 October 2011, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE, article "M2M Bootstrap-Erase Procedure M2M" |
| See also references of EP2697916A4 |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014182674A1 (en) * | 2013-05-06 | 2014-11-13 | Convida Wireless LLC | Machine-to-machine bootstrapping |
| JP2018026862A (ja) * | 2013-05-06 | 2018-02-15 | コンヴィーダ ワイヤレス, エルエルシー | マシンツーマシンブートストラッピング |
| US10977052B2 (en) | 2013-05-06 | 2021-04-13 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
| US11354136B2 (en) | 2013-05-06 | 2022-06-07 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
| US11829774B2 (en) | 2013-05-06 | 2023-11-28 | Convida Wireless, Llc | Machine-to-machine bootstrapping |
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2012141556A2 (en) | Machine-to-machine node erase procedure | |
| WO2016111600A1 (en) | Mutual authentication between user equipment and an evolved packet core | |
| WO2013025085A2 (en) | Apparatus and method for supporting family cloud in cloud computing system | |
| WO2023033586A1 (ko) | Tcp 세션 제어에 기초하여 애플리케이션의 네트워크 접속을 제어하기 위한 시스템 및 그에 관한 방법 | |
| WO2015157942A1 (zh) | 接入无线网络的装置及方法 | |
| WO2022149874A1 (en) | Method and system of authentication and authorization in an msgin5g server | |
| WO2016123926A1 (zh) | 一种基于远程控制的sim卡终端管理方法及系统 | |
| WO2014088318A1 (en) | Method and apparatus for allocating an internet protocol address to a client device | |
| WO2018101565A1 (ko) | 네트워크 가상화 환경에서 보안 관리를 위한 구조 | |
| WO2016167553A1 (en) | Method for performing multiple authentications within service registration procedure | |
| WO2023033585A1 (ko) | 분산 게이트웨이 환경에 최적화된 터널링 및 게이트웨이 접속 시스템 및 그에 관한 방법 | |
| WO2023211121A1 (ko) | 프록시에 기반하여 애플리케이션의 파일 송신 및 수신을 제어하기 위한 시스템 및 그에 관한 방법 | |
| WO2016126023A1 (en) | Broadcast apparatus and method of authenticating broadcast data | |
| WO2021261728A1 (ko) | 다기능을 가지는 보안 연결을 제공하는 보안 통신 장치 및 그 동작 방법 | |
| WO2014171727A1 (en) | Apparatus and method for generating key hierarchy in wireless network | |
| WO2023211104A1 (ko) | 컨트롤러 기반 네트워크 접속을 제어하기 위한 시스템 및 그에 관한 방법 | |
| WO2019194412A1 (en) | Network apparatus and control method thereof | |
| WO2015002436A1 (en) | Method and apparatus for optimizing data route in mobile communication system | |
| WO2022231304A1 (ko) | 컨트롤러 기반의 네트워크 접속을 제어하기 위한 시스템 및 그에 관한 방법 | |
| WO2015026083A1 (ko) | 휴대폰 본인인증 도용방지와 스미싱 방지를 위한 문자메시지 보안시스템 및 방법 | |
| WO2018084548A1 (ko) | 통신 시스템에서 발신자를 인증하기 위한 장치 및 방법 | |
| WO2022035161A1 (ko) | 전산망 해킹방지 시스템 및 방법 | |
| WO2015053602A1 (ko) | 이동 통신 시스템 환경에서 프록시미티 기반 서비스를 위한 보안 및 정보 지원 방법 및 시스템 | |
| WO2020242062A1 (ko) | 멀티캐스트 그룹 내의 구독자에게 키 데이터를 전송하는 디바이스 | |
| WO2018236137A1 (ko) | M2m 시스템에서 요청 메시지를 처리하는 방법 및 그 장치 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12771806 Country of ref document: EP Kind code of ref document: A2 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2012771806 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2014505088 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 20137030300 Country of ref document: KR Kind code of ref document: A |