[go: up one dir, main page]

IN2014CN03915A - - Google Patents

Download PDF

Info

Publication number
IN2014CN03915A
IN2014CN03915A IN3915CHN2014A IN2014CN03915A IN 2014CN03915 A IN2014CN03915 A IN 2014CN03915A IN 3915CHN2014 A IN3915CHN2014 A IN 3915CHN2014A IN 2014CN03915 A IN2014CN03915 A IN 2014CN03915A
Authority
IN
India
Prior art keywords
naf
bootstrapping key
server
external code
specific bootstrapping
Prior art date
Application number
Inventor
Silke Holtmanns
Pekka Johannes Laitinen
Original Assignee
Nokia Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corp filed Critical Nokia Corp
Publication of IN2014CN03915A publication Critical patent/IN2014CN03915A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for providing a security mechanism for an external code wherein the method includes receiving the externalcode comprising a request for a server specific bootstrapping key (Ks_NAF). The method further comprisesdetermining a server identifier (NAF Id) and a security token. Furthermore the method comprises generating the server specific bootstrapping key (Ks_NAF) based on the server identifier (NAF Id) and generating an external code specific bootstrapping key (Ks_js_NAF) using the server specific bootstrapping key (Ks_NAF)and the security token. The method also comprises using the external code specific bootstrapping key (Ks_js_NAF) for the security mechanism of the external code.
IN3915CHN2014 2011-10-31 2011-10-31 IN2014CN03915A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/FI2011/050953 WO2013064716A1 (en) 2011-10-31 2011-10-31 Security mechanism for external code

Publications (1)

Publication Number Publication Date
IN2014CN03915A true IN2014CN03915A (en) 2015-10-16

Family

ID=48191420

Family Applications (1)

Application Number Title Priority Date Filing Date
IN3915CHN2014 IN2014CN03915A (en) 2011-10-31 2011-10-31

Country Status (18)

Country Link
US (1) US20150163669A1 (en)
EP (1) EP2774068A4 (en)
JP (1) JP2015501613A (en)
KR (1) KR20140095523A (en)
CN (1) CN104011730A (en)
AP (1) AP3955A (en)
AU (1) AU2011380272A1 (en)
BR (1) BR112014010472A2 (en)
CA (1) CA2853867A1 (en)
IL (1) IL232374A0 (en)
IN (1) IN2014CN03915A (en)
MX (1) MX2014005223A (en)
PH (1) PH12014500964A1 (en)
RU (1) RU2582863C2 (en)
SG (1) SG11201401950PA (en)
UA (1) UA108957C2 (en)
WO (1) WO2013064716A1 (en)
ZA (1) ZA201403900B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2912815B1 (en) * 2012-10-29 2016-06-29 Telefonaktiebolaget LM Ericsson (publ) Method and apparatus for securing a connection in a communications network
US9253185B2 (en) * 2012-12-12 2016-02-02 Nokia Technologies Oy Cloud centric application trust validation
CN104348801B (en) * 2013-07-31 2018-05-04 华为技术有限公司 Authentication method, the method and relevant apparatus for generating credential
EP3058694B1 (en) * 2013-10-15 2018-12-12 Telefonaktiebolaget LM Ericsson (publ) Establishing a secure connection between a master device and a slave device
EP3085007B1 (en) 2013-12-20 2023-03-15 Nokia Technologies Oy Push-based trust model for public cloud applications
EP3248404B1 (en) * 2015-01-19 2020-07-22 Telefonaktiebolaget L M Ericsson (publ) Method and apparatus for direct communication key establishment
CN106487501B (en) * 2015-08-27 2020-12-08 华为技术有限公司 Key distribution and reception method, key management center, first and second network elements
US10129235B2 (en) 2015-10-16 2018-11-13 Qualcomm Incorporated Key hierarchy for network slicing
EP3414927B1 (en) * 2016-02-12 2020-06-24 Telefonaktiebolaget LM Ericsson (PUBL) Securing an interface and a process for establishing a secure communication link
WO2019108100A1 (en) * 2017-11-29 2019-06-06 Telefonaktiebolaget Lm Ericsson (Publ) Session key establishment
FR3077175A1 (en) * 2018-01-19 2019-07-26 Orange TECHNIQUE FOR DETERMINING A KEY FOR SECURING COMMUNICATION BETWEEN USER EQUIPMENT AND AN APPLICATION SERVER
CN110831002B (en) * 2018-08-10 2021-12-03 华为技术有限公司 Method and device for key deduction and computing storage medium
WO2020146974A1 (en) * 2019-01-14 2020-07-23 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for security
CN113015159B (en) * 2019-12-03 2023-05-09 中国移动通信有限公司研究院 Initial security configuration method, security module and terminal
US20230093720A1 (en) * 2021-09-17 2023-03-23 Qualcomm Incorporated Securing Application Communication

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7558957B2 (en) * 2005-04-18 2009-07-07 Alcatel-Lucent Usa Inc. Providing fresh session keys
CN100379315C (en) * 2005-06-21 2008-04-02 华为技术有限公司 Method for authenticating a user terminal
CN1929370A (en) * 2005-09-05 2007-03-14 华为技术有限公司 Method and system for confirming identification using key when user accessing identification proxy
US20070101122A1 (en) * 2005-09-23 2007-05-03 Yile Guo Method and apparatus for securely generating application session keys
US20070086590A1 (en) * 2005-10-13 2007-04-19 Rolf Blom Method and apparatus for establishing a security association
US8522025B2 (en) * 2006-03-28 2013-08-27 Nokia Corporation Authenticating an application
WO2009046400A1 (en) * 2007-10-05 2009-04-09 Interdigital Technology Corporation Techniques for secure channelization between uicc and a terminal
US9178696B2 (en) * 2007-11-30 2015-11-03 Telefonaktiebolaget L M Ericsson (Publ) Key management for secure communication
US8875232B2 (en) * 2009-02-18 2014-10-28 Telefonaktiebolaget L M Ericsson (Publ) User authentication
WO2010114475A2 (en) * 2009-04-01 2010-10-07 Telefonaktiebolaget L M Ericsson (Publ) Security key management in ims-based multimedia broadcast and multicast services (mbms)
RU101231U1 (en) * 2010-03-02 2011-01-10 Закрытое акционерное общество "Лаборатория Касперского" MOBILE COMPUTER DEVICE SECURITY MANAGEMENT SYSTEM
EP2695410B1 (en) * 2011-04-01 2017-04-19 Telefonaktiebolaget LM Ericsson (publ) Methods and apparatuses for avoiding damage in network attacks

Also Published As

Publication number Publication date
WO2013064716A1 (en) 2013-05-10
AP2014007624A0 (en) 2014-05-31
UA108957C2 (en) 2015-06-25
PH12014500964A1 (en) 2014-06-30
CA2853867A1 (en) 2013-05-10
US20150163669A1 (en) 2015-06-11
SG11201401950PA (en) 2014-09-26
RU2582863C2 (en) 2016-04-27
EP2774068A4 (en) 2015-08-05
CN104011730A (en) 2014-08-27
AU2011380272A1 (en) 2014-05-22
ZA201403900B (en) 2017-05-31
IL232374A0 (en) 2014-06-30
KR20140095523A (en) 2014-08-01
RU2014118918A (en) 2015-12-10
BR112014010472A2 (en) 2017-04-18
MX2014005223A (en) 2014-09-01
JP2015501613A (en) 2015-01-15
EP2774068A1 (en) 2014-09-10
AP3955A (en) 2016-12-22

Similar Documents

Publication Publication Date Title
IN2014CN03915A (en)
WO2012034083A3 (en) Transportation information systems and methods
WO2010015906A3 (en) Apparatus, systems and methods for authentication of objects having multiple components
CL2014002816A1 (en) User authentication method, which includes receiving a user request to initiate authentication session, accessing a memory stored record associated with the user, generating a security matrix, transmitting the matrix to the user, receiving from the user an orderly sequence of values of code selected from the matrix, validate the received sequence, generate an authentication result; apparatus; system
IN2012DN02104A (en)
SG10201803986RA (en) Method and system for secure transmission of remote notification service messages to mobile devices without secure elements
WO2013066513A3 (en) Systems and methods to secure user identification
GB2505590A (en) System and method for secure instant messaging
WO2013032671A3 (en) Methods and apparatus for source authentication of messages that are secured with a group key
NZ593549A (en) Product ordering and inventory-taking system using portable communications devices
WO2012037166A3 (en) Systems and methods for user interaction based on license or other identification information
WO2013005989A3 (en) Method and apparatus for managing group key for mobile device
BR112013001728A2 (en) methods for encrypting a value entered in a user device, for verifying a value communicated to an authentication system via a communications network, and for communicating a value entered in a user device to an authentication system via a communications network, user device, system, software, and computer readable medium.
EP2728556A3 (en) Electronic key registration method, electronic key registration system, and controller
GB2472169A (en) System and method for providing a system management command
BR112017008214A2 (en) methods and systems for authentication interoperability
WO2011122912A3 (en) Method and system for managing an encryption key for a broadcasting service
WO2012024312A3 (en) Methods, systems, and computer readable media for providing an electronic advertisement to a mobile device
MX2012004070A (en) Electronic transaction security system and method.
WO2013166250A3 (en) Using actions to select advertisements
BR112013021704A2 (en) secure management and customization of unique code signing keys
WO2014125375A3 (en) Secure mobile payments
WO2012141495A3 (en) Apparatus and method for providing a transaction service
MX2018003345A (en) Information registration and authentication method and device.
GB2523031A (en) Method and apparatus for processing digital service signal