KR20140002773A - 무선 네트워크에서 디지털 인증서들을 관리하기 위한 플렉시블 시스템 및 방법 - Google Patents
무선 네트워크에서 디지털 인증서들을 관리하기 위한 플렉시블 시스템 및 방법 Download PDFInfo
- Publication number
- KR20140002773A KR20140002773A KR1020137027868A KR20137027868A KR20140002773A KR 20140002773 A KR20140002773 A KR 20140002773A KR 1020137027868 A KR1020137027868 A KR 1020137027868A KR 20137027868 A KR20137027868 A KR 20137027868A KR 20140002773 A KR20140002773 A KR 20140002773A
- Authority
- KR
- South Korea
- Prior art keywords
- cms
- certificate
- sur
- base station
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000007726 management method Methods 0.000 description 19
- 239000010410 layer Substances 0.000 description 14
- 238000004891 communication Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000011229 interlayer Substances 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
- H04L9/007—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models involving hierarchical structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
- H04L63/064—Hierarchical key distribution, e.g. by multi-tier trusted parties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
도 2는 보안 방법들이 실행된 LTE 네트워크의 일부의 고레벨 개략도.
도 3 내지 도 5는 무선 네트워크에서 디지털 인증서들을 관리하기 위한 다수의 CMS 계층적 아키텍처 모델들의 개략도들. 각각의 도면들의 유사한 요소들은 유사한 참조 번호들로 표시된다.
도 3은 운영자 인증 기관(CA)이 없고 모든 노드가 ROOT CMS의 CA를 신뢰하는 모델의 개략도.
도 4는 운영자가 CA를 소유하고 모든 노드가 운영자 CA를 신뢰하는 모델의 개략도.
도 5는 운영자 CA가 있고, 기지국들은 ROOT CMS의 CA를 신뢰하고, SEG들은 운영자 CA를 신뢰하는 직접 교차-인증 모델의 개략도.
도 6은 두 개의 신뢰된 기관들이 있는 모델의 개략도. 즉, 기지국들은 ROOT CMS의 CA를 신뢰하고, SEG들은 외부 CA를 신뢰한다.
도 7 내지 도 11은 여기에 기술되는 디지털 인증서 관리의 몇몇 사용 경우들을 예시하는 프로토콜 메시징 도면들.
330 : SEGs 340 : IPsec 터널들
Claims (10)
- 디지털 인증서들에 대한 요청들을 처리하고, 최상위 인증서들을 발행하기 위해 권한 부여되고, 대리 인증서 관리 시스템들(sur-CMSs)을 자동으로 인증하고, 인증서 요청들을 자동으로 처리하고 성공적으로 인증된 sur-CMSs에 인증서 번들들을 발행하도록 구성되는, 최상위 인증서 관리 시스템(root CMS); 및
두 개 이상의 sur-CMSs로서, 그의 각각은 각각의 영역내에 그에 할당된 하나 이상의 기지국들을 갖는, 상기 두 개 이상의 sur-CMSs를 포함하고,
각각의 상기 sur-CMS는 그의 자신의 기지국들을 자동으로 인증하고, 인증서 요청들을 자동으로 처리하고, 성공적으로 인증되는 인증서 번들들을 기지국들에 발행하도록 구성되고,
상기 기지국에 발행된 각각의 기지국 번들은: 이러한 기지국의 공개 키의, sur-CMS를 발행함으로써 서명된, 디지털 인증서; 및 상기 최상위 CMS의 자기-서명된 인증서를 포함하는 적어도 하나의 다른 디지털 인증서를 포함하는, 시스템. - 제 1 항에 있어서,
상기 최상위 CMS 및 적어도 하나의 상기 sur-CMS는 영역들의 각각에 적어도 하나의 보안 게이트웨이 집합자(SEG)를 자동으로 인증하고 인증서 요청들을 자동으로 처리하고 성공적으로 인증되는 인증서 번들들을 SEG들에 발행하도록 추가로 구성되는, 시스템. - 제 1 항에 있어서,
상기 최상위 CMS는 인증 기관(CA)에 의해 인증되고 상기 CA에 의해 발행된 디지털 인증서를 수신하도록 구성되고, 상기 디지털 인증서는 공개 키를 상기 최상위 CMS에 결합시키는, 시스템. - 제 3 항에 있어서,
기지국에 발행된 각각의 인증서 번들은 공개키를 상기 최상위 CMS에 결합시키는 상기 디지털 인증서를 추가로 포함하고, 상기 CA의 자기-서명된 인증서를 추가로 포함하는, 시스템. - 제 3 항에 있어서,
상기 최상위 CMS는 상기 CA를 인증하고, 인증서 요청을 처리하고, 디지털 서명을 상기 CA에 발행하도록 구성되고, 상기 디지털 인증서는 공개 키를 상기 CA에 결합시키는, 시스템. - 디지털 인증서들을 분배하기 위해 인증서 관리 시스템(CMS)을 사용하는 종류의 무선 네트워크에서 수행될 방법에 있어서,
대리 CMS(sur-CMS)에 의해, 최상위 CMS로부터 디지털 인증서를 획득하는 상기 sur-CMS를 초래하는 인증 절차를 수행하는 단계;
상기 sur-CMS에 의해, 하나 이상의 기지국들을 자동으로 인증하는 단계; 및
상기 sur-CMS에 의해, 디지털 인증서 번들을 각각의 인증된 기지국에 자동으로 발행하는 단계로서, 상기 번들은 이러한 기지국의 공개 키의, 상기 발행하는 sur-CMS에 의해 서명된, 디지털 인증서, 및 상기 최상위 CMS의 자기-서명된 인증서를 포함하는 적어도 하나의 다른 디지털 인증서를 포함하는, 상기 자동 발행 단계를 포함하는, 방법. - 제 6 항에 있어서,
상기 sur-CMS에 의해, 적어도 하나의 보안 게이트웨이 집합자(SEG)를 자동으로 인증하는 단계; 및
상기 sur-CMS에 의해, 디지털 인증서 번들을 각각의 인증된 SEG에 자동으로 발행하는 단계를 추가로 포함하는, 방법. - 제 6 항에 있어서,
각각의 인증된 기지국에 발행된 상기 디지털 인증서 번들은 상기 최상위 CMS로부터 멀리 떨어진 인증 기관의, 상기 최상위 CMS에 의해 발행된 디지털 인증서를 추가로 포함하는, 방법. - 디지털 인증서들을 발행하기 위해 인증서 관리 시스템(CMS)을 사용하는 종류의 무선 네트워크에서 수행될 방법에 있어서,
대리 CMS(sur-CMS)로부터 디지털 인증서 번들을 수신하는 기지국을 초래하는 인증 절차를 상기 기지국에 의해 수행하는 단계; 및
보안 게이트웨이 집합자(SEG)를 갖는 보안 터널을 설정하는 상기 기지국을 초래하는 인증 절차를 상기 기지국에 의해 수행하는 단계를 포함하고,
상기 sur-CMS로부터 수신된 상기 인증서 번들은 상기 sur-CMS에 의해 서명된 디지털 인증서 및 최상위 CMS에 의해 자기-서명된 디지털 인증서를 포함하는, 방법. - 제 9 항에 있어서,
상기 sur-CMS로부터 수신된 상기 인증서 번들은 상기 최상위 CMS로부터 멀리 떨어진 인증 기관(CA)의, 상기 최상위 CMS에 의해 발행된, 디지털 인증서를 추가로 포함하고,
상기 기지국과 상기 SEG 간의 상기 인증 절차는 적어도:
상기 최상위 CMS에 의해 자기-서명된 디지털 인증서, 및
상기 최상위 CMS로부터 멀리 떨어진 CA의, 상기 최상위 CMS에 의해 발행된 디지털 인증서를 사용하는, 방법.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161467089P | 2011-03-24 | 2011-03-24 | |
US61/467,089 | 2011-03-24 | ||
US13/155,614 | 2011-06-08 | ||
US13/155,614 US8627064B2 (en) | 2011-03-24 | 2011-06-08 | Flexible system and method to manage digital certificates in a wireless network |
PCT/US2012/025782 WO2012128876A1 (en) | 2011-03-24 | 2012-02-20 | A flexible system and method to manage digital certificates in a wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20140002773A true KR20140002773A (ko) | 2014-01-08 |
KR101532968B1 KR101532968B1 (ko) | 2015-07-09 |
Family
ID=46878338
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020137027868A Expired - Fee Related KR101532968B1 (ko) | 2011-03-24 | 2012-02-20 | 무선 네트워크에서 디지털 인증서들을 관리하기 위한 플렉시블 시스템 및 방법 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8627064B2 (ko) |
EP (1) | EP2689597A1 (ko) |
JP (2) | JP2014512120A (ko) |
KR (1) | KR101532968B1 (ko) |
CN (1) | CN103460736B (ko) |
WO (1) | WO2012128876A1 (ko) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8413226B2 (en) * | 2008-05-13 | 2013-04-02 | Telefonaktiebolaget Lm Ericsson (Publ) | User-type handling in a wireless access network |
US8627064B2 (en) * | 2011-03-24 | 2014-01-07 | Alcatel Lucent | Flexible system and method to manage digital certificates in a wireless network |
US9549317B2 (en) * | 2011-10-17 | 2017-01-17 | Mitel Mobility Inc. | Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network |
CN102711106B (zh) * | 2012-05-21 | 2018-08-10 | 中兴通讯股份有限公司 | 建立IPSec隧道的方法及系统 |
US9253636B2 (en) * | 2012-08-15 | 2016-02-02 | Cisco Technology, Inc. | Wireless roaming and authentication |
US9762569B2 (en) * | 2012-10-15 | 2017-09-12 | Nokia Solutions And Networks Oy | Network authentication |
AU2013342220A1 (en) * | 2012-11-09 | 2015-06-04 | Ent Technologies, Inc. | Entity Network Translation (ENT) |
EP2979415B1 (en) | 2013-03-27 | 2017-05-10 | Nokia Solutions and Networks Oy | Secured network architecture |
US9288672B2 (en) * | 2013-09-23 | 2016-03-15 | Qualcomm Incorporated | Method for configuring a remote station with a certificate from a local root certificate authority for securing a wireless network |
US9413738B2 (en) * | 2014-06-19 | 2016-08-09 | Microsoft Technology Licensing, Llc | Securing communications with enhanced media platforms |
US10432610B2 (en) * | 2015-06-30 | 2019-10-01 | Vmware, Inc. | Automated monitoring and managing of certificates |
US9819497B2 (en) * | 2015-06-30 | 2017-11-14 | Vmware, Inc. | Automated provisioning of certificates |
CN108702322B (zh) * | 2016-03-02 | 2022-01-07 | 日本电气株式会社 | 网络系统、终端、传感器数据收集方法以及程序 |
US10313878B2 (en) * | 2016-09-16 | 2019-06-04 | Qualcomm Incorporated | On-demand network function re-authentication based on key refresh |
US10397006B2 (en) * | 2017-02-13 | 2019-08-27 | Amazon Technologies, Inc. | Network security with surrogate digital certificates |
CN108990060B (zh) * | 2017-06-05 | 2021-02-02 | 中国移动通信集团公司 | 一种基站设备的证书分发系统及方法 |
US10756908B1 (en) | 2019-02-22 | 2020-08-25 | Beyond Identity Inc. | User authentication with self-signed certificate and identity verification |
US20220158851A1 (en) * | 2019-04-29 | 2022-05-19 | Hyundai Motor Company | Cross-certificate method and device for electric vehicle charging |
CN112261068B (zh) * | 2020-12-22 | 2021-03-19 | 北京翼辉信息技术有限公司 | 一种局域网内的动态 tls 认证方法、装置及存储介质 |
CN117581508A (zh) * | 2022-05-13 | 2024-02-20 | 北京小米移动软件有限公司 | 认证方法、装置、通信设备及存储介质 |
CN115277001B (zh) * | 2022-06-20 | 2024-07-05 | 中国联合网络通信集团有限公司 | 一种共建共享网络的证书分发方法、装置、系统及介质 |
US20250030676A1 (en) * | 2023-07-18 | 2025-01-23 | Oracle International Corporation | Provisioning cloud resource instances associated with a virtual cloud network |
WO2025071943A1 (en) * | 2023-09-27 | 2025-04-03 | Google Llc | Authenticating system information blocks |
CN119254541B (zh) * | 2024-12-04 | 2025-03-04 | 鹏城实验室 | 联盟网站管理系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7631183B2 (en) * | 2004-09-01 | 2009-12-08 | Research In Motion Limited | System and method for retrieving related certificates |
US8176328B2 (en) | 2008-09-17 | 2012-05-08 | Alcatel Lucent | Authentication of access points in wireless local area networks |
US20100318788A1 (en) | 2009-06-12 | 2010-12-16 | Alexandro Salvarani | Method of managing secure communications |
CN101931952B (zh) * | 2010-08-25 | 2012-12-12 | 广州杰赛科技股份有限公司 | 一种无线城域网系统及其鉴别认证方法 |
US8627064B2 (en) * | 2011-03-24 | 2014-01-07 | Alcatel Lucent | Flexible system and method to manage digital certificates in a wireless network |
-
2011
- 2011-06-08 US US13/155,614 patent/US8627064B2/en not_active Expired - Fee Related
-
2012
- 2012-02-20 EP EP12706175.2A patent/EP2689597A1/en not_active Withdrawn
- 2012-02-20 KR KR1020137027868A patent/KR101532968B1/ko not_active Expired - Fee Related
- 2012-02-20 JP JP2014501077A patent/JP2014512120A/ja active Pending
- 2012-02-20 CN CN201280014533.4A patent/CN103460736B/zh not_active Expired - Fee Related
- 2012-02-20 WO PCT/US2012/025782 patent/WO2012128876A1/en active Application Filing
-
2015
- 2015-12-28 JP JP2015256031A patent/JP2016067054A/ja not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2012128876A1 (en) | 2012-09-27 |
JP2014512120A (ja) | 2014-05-19 |
JP2016067054A (ja) | 2016-04-28 |
US20120246466A1 (en) | 2012-09-27 |
CN103460736A (zh) | 2013-12-18 |
KR101532968B1 (ko) | 2015-07-09 |
CN103460736B (zh) | 2017-06-20 |
EP2689597A1 (en) | 2014-01-29 |
US8627064B2 (en) | 2014-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101532968B1 (ko) | 무선 네트워크에서 디지털 인증서들을 관리하기 위한 플렉시블 시스템 및 방법 | |
Bikos et al. | LTE/SAE security issues on 4G wireless networks | |
WO2020174121A1 (en) | Inter-mobile network communication authorization | |
Sanchez-Gomez et al. | Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions | |
WO2018013925A1 (en) | Adaptive authorization framework for communication networks | |
KR101146204B1 (ko) | 패킷 데이터 네트워크에 응급 서비스 신뢰를 제공하기 위한 시스템 및 방법 | |
US9847875B1 (en) | Methods and systems for bootstrapping an end-to-end application layer session security keyset based on a subscriber identity master security credential | |
CN112602344A (zh) | 漫游5g-nr通信的端到端安全性 | |
CN114500120A (zh) | 一种公共云的扩展方法、设备、系统及存储介质 | |
Angelogianni et al. | On identifying threats and quantifying cybersecurity risks of mnos deploying heterogeneous rats | |
Boubakri et al. | Access control in 5G communication networks using simple PKI certificates | |
Liyanage et al. | Novel secure VPN architectures for LTE backhaul networks | |
CN105325020A (zh) | 用于毫微微接入点之间的通信方法以及毫微微接入点 | |
Fossati et al. | Love all, trust few: On trusting intermediaries in HTTP | |
Aiash et al. | Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR | |
Merlino et al. | Infrastructure-centric, networkserver-agnostic lorawan roaming | |
Lei et al. | 5G security system design for all ages | |
Kumar et al. | A public key infrastructure for 5g service-based architecture | |
Southern et al. | Wireless security: securing mobile UMTS communications from interoperation of GSM | |
Aiash et al. | A secure framework for communications in heterogeneous networks | |
Aiash | An integrated approach to QoS and security in future mobile networks using the Y-Comm framework | |
Xenakis et al. | Alternative Schemes for Dynamic Secure VPN Deployment in UMTS | |
Liyanage et al. | ‘Securing the communication of industrial Internet | |
Mousavi | A survey on cybersecurity in 5G | |
Sher et al. | Development of IMS privacy & security management framework for Fokus open IMS testbed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0105 | International application |
Patent event date: 20131023 Patent event code: PA01051R01D Comment text: International Patent Application |
|
PA0201 | Request for examination | ||
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20141103 Patent event code: PE09021S01D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20150331 |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20150625 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20150626 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
FPAY | Annual fee payment |
Payment date: 20180619 Year of fee payment: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20180619 Start annual number: 4 End annual number: 4 |
|
FPAY | Annual fee payment |
Payment date: 20190530 Year of fee payment: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20190530 Start annual number: 5 End annual number: 5 |
|
PC1903 | Unpaid annual fee |
Termination category: Default of registration fee Termination date: 20210406 |