IN2014CN03915A - - Google Patents
Download PDFInfo
- Publication number
- IN2014CN03915A IN2014CN03915A IN3915CHN2014A IN2014CN03915A IN 2014CN03915 A IN2014CN03915 A IN 2014CN03915A IN 3915CHN2014 A IN3915CHN2014 A IN 3915CHN2014A IN 2014CN03915 A IN2014CN03915 A IN 2014CN03915A
- Authority
- IN
- India
- Prior art keywords
- naf
- bootstrapping key
- server
- external code
- specific bootstrapping
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
A method for providing a security mechanism for an external code wherein the method includes receiving the externalcode comprising a request for a server specific bootstrapping key (Ks_NAF). The method further comprisesdetermining a server identifier (NAF Id) and a security token. Furthermore the method comprises generating the server specific bootstrapping key (Ks_NAF) based on the server identifier (NAF Id) and generating an external code specific bootstrapping key (Ks_js_NAF) using the server specific bootstrapping key (Ks_NAF)and the security token. The method also comprises using the external code specific bootstrapping key (Ks_js_NAF) for the security mechanism of the external code.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/FI2011/050953 WO2013064716A1 (en) | 2011-10-31 | 2011-10-31 | Security mechanism for external code |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN03915A true IN2014CN03915A (en) | 2015-10-16 |
Family
ID=48191420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN3915CHN2014 IN2014CN03915A (en) | 2011-10-31 | 2011-10-31 |
Country Status (18)
Country | Link |
---|---|
US (1) | US20150163669A1 (en) |
EP (1) | EP2774068A4 (en) |
JP (1) | JP2015501613A (en) |
KR (1) | KR20140095523A (en) |
CN (1) | CN104011730A (en) |
AP (1) | AP3955A (en) |
AU (1) | AU2011380272A1 (en) |
BR (1) | BR112014010472A2 (en) |
CA (1) | CA2853867A1 (en) |
IL (1) | IL232374A0 (en) |
IN (1) | IN2014CN03915A (en) |
MX (1) | MX2014005223A (en) |
PH (1) | PH12014500964A1 (en) |
RU (1) | RU2582863C2 (en) |
SG (1) | SG11201401950PA (en) |
UA (1) | UA108957C2 (en) |
WO (1) | WO2013064716A1 (en) |
ZA (1) | ZA201403900B (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2912815B1 (en) * | 2012-10-29 | 2016-06-29 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for securing a connection in a communications network |
US9253185B2 (en) * | 2012-12-12 | 2016-02-02 | Nokia Technologies Oy | Cloud centric application trust validation |
CN104348801B (en) * | 2013-07-31 | 2018-05-04 | 华为技术有限公司 | Authentication method, the method and relevant apparatus for generating credential |
EP3058694B1 (en) * | 2013-10-15 | 2018-12-12 | Telefonaktiebolaget LM Ericsson (publ) | Establishing a secure connection between a master device and a slave device |
EP3085007B1 (en) | 2013-12-20 | 2023-03-15 | Nokia Technologies Oy | Push-based trust model for public cloud applications |
EP3248404B1 (en) * | 2015-01-19 | 2020-07-22 | Telefonaktiebolaget L M Ericsson (publ) | Method and apparatus for direct communication key establishment |
CN106487501B (en) * | 2015-08-27 | 2020-12-08 | 华为技术有限公司 | Key distribution and reception method, key management center, first and second network elements |
US10129235B2 (en) | 2015-10-16 | 2018-11-13 | Qualcomm Incorporated | Key hierarchy for network slicing |
EP3414927B1 (en) * | 2016-02-12 | 2020-06-24 | Telefonaktiebolaget LM Ericsson (PUBL) | Securing an interface and a process for establishing a secure communication link |
WO2019108100A1 (en) * | 2017-11-29 | 2019-06-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Session key establishment |
FR3077175A1 (en) * | 2018-01-19 | 2019-07-26 | Orange | TECHNIQUE FOR DETERMINING A KEY FOR SECURING COMMUNICATION BETWEEN USER EQUIPMENT AND AN APPLICATION SERVER |
CN110831002B (en) * | 2018-08-10 | 2021-12-03 | 华为技术有限公司 | Method and device for key deduction and computing storage medium |
WO2020146974A1 (en) * | 2019-01-14 | 2020-07-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for security |
CN113015159B (en) * | 2019-12-03 | 2023-05-09 | 中国移动通信有限公司研究院 | Initial security configuration method, security module and terminal |
US20230093720A1 (en) * | 2021-09-17 | 2023-03-23 | Qualcomm Incorporated | Securing Application Communication |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7558957B2 (en) * | 2005-04-18 | 2009-07-07 | Alcatel-Lucent Usa Inc. | Providing fresh session keys |
CN100379315C (en) * | 2005-06-21 | 2008-04-02 | 华为技术有限公司 | Method for authenticating a user terminal |
CN1929370A (en) * | 2005-09-05 | 2007-03-14 | 华为技术有限公司 | Method and system for confirming identification using key when user accessing identification proxy |
US20070101122A1 (en) * | 2005-09-23 | 2007-05-03 | Yile Guo | Method and apparatus for securely generating application session keys |
US20070086590A1 (en) * | 2005-10-13 | 2007-04-19 | Rolf Blom | Method and apparatus for establishing a security association |
US8522025B2 (en) * | 2006-03-28 | 2013-08-27 | Nokia Corporation | Authenticating an application |
WO2009046400A1 (en) * | 2007-10-05 | 2009-04-09 | Interdigital Technology Corporation | Techniques for secure channelization between uicc and a terminal |
US9178696B2 (en) * | 2007-11-30 | 2015-11-03 | Telefonaktiebolaget L M Ericsson (Publ) | Key management for secure communication |
US8875232B2 (en) * | 2009-02-18 | 2014-10-28 | Telefonaktiebolaget L M Ericsson (Publ) | User authentication |
WO2010114475A2 (en) * | 2009-04-01 | 2010-10-07 | Telefonaktiebolaget L M Ericsson (Publ) | Security key management in ims-based multimedia broadcast and multicast services (mbms) |
RU101231U1 (en) * | 2010-03-02 | 2011-01-10 | Закрытое акционерное общество "Лаборатория Касперского" | MOBILE COMPUTER DEVICE SECURITY MANAGEMENT SYSTEM |
EP2695410B1 (en) * | 2011-04-01 | 2017-04-19 | Telefonaktiebolaget LM Ericsson (publ) | Methods and apparatuses for avoiding damage in network attacks |
-
2011
- 2011-10-31 AU AU2011380272A patent/AU2011380272A1/en not_active Abandoned
- 2011-10-31 US US14/354,904 patent/US20150163669A1/en not_active Abandoned
- 2011-10-31 CN CN201180076059.3A patent/CN104011730A/en active Pending
- 2011-10-31 UA UAA201405037A patent/UA108957C2/en unknown
- 2011-10-31 SG SG11201401950PA patent/SG11201401950PA/en unknown
- 2011-10-31 MX MX2014005223A patent/MX2014005223A/en not_active Application Discontinuation
- 2011-10-31 WO PCT/FI2011/050953 patent/WO2013064716A1/en active Application Filing
- 2011-10-31 JP JP2014539369A patent/JP2015501613A/en active Pending
- 2011-10-31 IN IN3915CHN2014 patent/IN2014CN03915A/en unknown
- 2011-10-31 RU RU2014118918/08A patent/RU2582863C2/en not_active IP Right Cessation
- 2011-10-31 PH PH1/2014/500964A patent/PH12014500964A1/en unknown
- 2011-10-31 CA CA2853867A patent/CA2853867A1/en not_active Abandoned
- 2011-10-31 KR KR1020147014546A patent/KR20140095523A/en not_active Ceased
- 2011-10-31 EP EP11875098.3A patent/EP2774068A4/en not_active Withdrawn
- 2011-10-31 BR BR112014010472A patent/BR112014010472A2/en not_active IP Right Cessation
- 2011-10-31 AP AP2014007624A patent/AP3955A/en active
-
2014
- 2014-04-30 IL IL232374A patent/IL232374A0/en unknown
- 2014-05-28 ZA ZA2014/03900A patent/ZA201403900B/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2013064716A1 (en) | 2013-05-10 |
AP2014007624A0 (en) | 2014-05-31 |
UA108957C2 (en) | 2015-06-25 |
PH12014500964A1 (en) | 2014-06-30 |
CA2853867A1 (en) | 2013-05-10 |
US20150163669A1 (en) | 2015-06-11 |
SG11201401950PA (en) | 2014-09-26 |
RU2582863C2 (en) | 2016-04-27 |
EP2774068A4 (en) | 2015-08-05 |
CN104011730A (en) | 2014-08-27 |
AU2011380272A1 (en) | 2014-05-22 |
ZA201403900B (en) | 2017-05-31 |
IL232374A0 (en) | 2014-06-30 |
KR20140095523A (en) | 2014-08-01 |
RU2014118918A (en) | 2015-12-10 |
BR112014010472A2 (en) | 2017-04-18 |
MX2014005223A (en) | 2014-09-01 |
JP2015501613A (en) | 2015-01-15 |
EP2774068A1 (en) | 2014-09-10 |
AP3955A (en) | 2016-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CN03915A (en) | ||
WO2012034083A3 (en) | Transportation information systems and methods | |
WO2010015906A3 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
CL2014002816A1 (en) | User authentication method, which includes receiving a user request to initiate authentication session, accessing a memory stored record associated with the user, generating a security matrix, transmitting the matrix to the user, receiving from the user an orderly sequence of values of code selected from the matrix, validate the received sequence, generate an authentication result; apparatus; system | |
IN2012DN02104A (en) | ||
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
WO2013066513A3 (en) | Systems and methods to secure user identification | |
GB2505590A (en) | System and method for secure instant messaging | |
WO2013032671A3 (en) | Methods and apparatus for source authentication of messages that are secured with a group key | |
NZ593549A (en) | Product ordering and inventory-taking system using portable communications devices | |
WO2012037166A3 (en) | Systems and methods for user interaction based on license or other identification information | |
WO2013005989A3 (en) | Method and apparatus for managing group key for mobile device | |
BR112013001728A2 (en) | methods for encrypting a value entered in a user device, for verifying a value communicated to an authentication system via a communications network, and for communicating a value entered in a user device to an authentication system via a communications network, user device, system, software, and computer readable medium. | |
EP2728556A3 (en) | Electronic key registration method, electronic key registration system, and controller | |
GB2472169A (en) | System and method for providing a system management command | |
BR112017008214A2 (en) | methods and systems for authentication interoperability | |
WO2011122912A3 (en) | Method and system for managing an encryption key for a broadcasting service | |
WO2012024312A3 (en) | Methods, systems, and computer readable media for providing an electronic advertisement to a mobile device | |
MX2012004070A (en) | Electronic transaction security system and method. | |
WO2013166250A3 (en) | Using actions to select advertisements | |
BR112013021704A2 (en) | secure management and customization of unique code signing keys | |
WO2014125375A3 (en) | Secure mobile payments | |
WO2012141495A3 (en) | Apparatus and method for providing a transaction service | |
MX2018003345A (en) | Information registration and authentication method and device. | |
GB2523031A (en) | Method and apparatus for processing digital service signal |