IN2014CN03607A - - Google Patents
Info
- Publication number
- IN2014CN03607A IN2014CN03607A IN3607CHN2014A IN2014CN03607A IN 2014CN03607 A IN2014CN03607 A IN 2014CN03607A IN 3607CHN2014 A IN3607CHN2014 A IN 3607CHN2014A IN 2014CN03607 A IN2014CN03607 A IN 2014CN03607A
- Authority
- IN
- India
- Prior art keywords
- network side
- key
- integrity
- integrity key
- secure boot
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/108—Source integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method system and related device for GSM security. The method is: a network side entity inferring an integrity key of a network side by utilizing a root cipher key of the network side generated during a one way authentication process with an MS and using the integrity key of the network side to protect a secure boot message where the secure boot message carries at least an integrity algorithm identity; and transmitting the protected secure boot message to the MS thereby allowing the MS to utilize an integrity key of the MS side and the integrity algorithm to protect information and to transmit same to the network side entity where the integrity key of the MS side is inferred by the MS side by utilizing a root cipher key of the MS side generated during the one way authentication process with the network side the root cipher key of the MS side is identical to the root cipher key of the network side while the integrity key of the MS side is identical to the integrity key of the network side. This enhances security for GSM systems and thus extends the application of some services including PWS in GSM systems.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110323667.1A CN103067168B (en) | 2011-10-21 | 2011-10-21 | A kind of GSM safety method and system, relevant device |
PCT/CN2012/083283 WO2013056681A1 (en) | 2011-10-21 | 2012-10-22 | Method, system, and related device for gsm security |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN03607A true IN2014CN03607A (en) | 2015-07-03 |
Family
ID=48109639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN3607CHN2014 IN2014CN03607A (en) | 2011-10-21 | 2012-10-22 |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2770767B1 (en) |
CN (1) | CN103067168B (en) |
BR (1) | BR112014009419A2 (en) |
IN (1) | IN2014CN03607A (en) |
RU (1) | RU2573745C2 (en) |
WO (1) | WO2013056681A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106714153B (en) * | 2015-11-13 | 2022-06-10 | 华为技术有限公司 | Key distribution, generation and reception method and related device |
CN107027117A (en) * | 2016-02-02 | 2017-08-08 | 普天信息技术有限公司 | A kind of method of dynamic generation root key |
CN107566115B (en) * | 2016-07-01 | 2022-01-14 | 华为技术有限公司 | Secret key configuration and security policy determination method and device |
CN108462898A (en) * | 2018-03-16 | 2018-08-28 | 深圳创维数字技术有限公司 | A kind of multimedia terminal awakening method, device and electronic equipment |
CN117235812A (en) * | 2023-10-10 | 2023-12-15 | 重庆城投曙光湖建设有限公司 | System for realizing big data security by using BIM |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007531337A (en) * | 2003-07-08 | 2007-11-01 | クゥアルコム・インコーポレイテッド | Method and apparatus for security in a data processing system |
PL2357858T6 (en) * | 2003-09-26 | 2018-11-30 | Telefonaktiebolaget L M Ericsson (Publ) | Enhanced security design for cryptography in mobile communication systems |
US7546459B2 (en) * | 2004-03-10 | 2009-06-09 | Telefonaktiebolaget L M Ericsson (Publ) | GSM-like and UMTS-like authentication in a CDMA2000 network environment |
US8353011B2 (en) * | 2005-06-13 | 2013-01-08 | Nokia Corporation | Apparatus, method and computer program product providing mobile node identities in conjunction with authentication preferences in generic bootstrapping architecture (GBA) |
WO2007062689A1 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for distributing keying information |
CN101163003A (en) * | 2006-10-12 | 2008-04-16 | 北京三星通信技术研究有限公司 | System and method for authenticating network for terminal when SIM card use UMTS terminal and UMTS system |
RU2416882C2 (en) * | 2006-10-20 | 2011-04-20 | Нокиа Корпорейшн | Generating security keys in next-generation mobile communication networks |
CN101384079A (en) * | 2007-09-03 | 2009-03-11 | 华为技术有限公司 | Method, system and apparatus for preventing degraded attack when terminal moving |
CN101552982A (en) * | 2008-04-01 | 2009-10-07 | 华为技术有限公司 | Method and user equipment for detecting degradation attack |
CN101277533B (en) * | 2008-04-30 | 2011-07-20 | 华为技术有限公司 | Method, apparatus and system for reinforcing communication security |
JP5649248B2 (en) * | 2010-04-16 | 2015-01-07 | クアルコム,インコーポレイテッド | Apparatus and method for transitioning from a serving network node that supports an improved security context to a traditional serving network node |
-
2011
- 2011-10-21 CN CN201110323667.1A patent/CN103067168B/en active Active
-
2012
- 2012-10-22 BR BR112014009419A patent/BR112014009419A2/en not_active IP Right Cessation
- 2012-10-22 WO PCT/CN2012/083283 patent/WO2013056681A1/en active Application Filing
- 2012-10-22 RU RU2014120404/08A patent/RU2573745C2/en active
- 2012-10-22 IN IN3607CHN2014 patent/IN2014CN03607A/en unknown
- 2012-10-22 EP EP12841999.1A patent/EP2770767B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
RU2573745C2 (en) | 2016-01-27 |
CN103067168A (en) | 2013-04-24 |
EP2770767A1 (en) | 2014-08-27 |
BR112014009419A2 (en) | 2017-04-18 |
EP2770767A4 (en) | 2015-07-01 |
EP2770767B1 (en) | 2017-02-01 |
RU2014120404A (en) | 2015-11-27 |
CN103067168B (en) | 2016-01-27 |
WO2013056681A1 (en) | 2013-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103491094B (en) | A kind of rapid identity authentication method based on C/S model | |
GB2508776A (en) | Methods and apparatus for brokering a transaction | |
MY171731A (en) | Key protection method and system | |
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
EP4149157A3 (en) | Method and apparatus for wireless communication in wireless communication system | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
GB2449617B (en) | A cryptographic key sharing method | |
WO2011149765A3 (en) | Rfid security and mobility architecture | |
WO2014031494A3 (en) | System and method for providing a secure computational environment | |
WO2012077999A3 (en) | Traffic encryption key management for machine to machine multicast group | |
GB2498039B (en) | Password recovery service | |
WO2014139341A8 (en) | Key management method and system | |
IN2014CN03607A (en) | ||
SG10201804297QA (en) | Systems and methods for software based encryption | |
EP2394452A4 (en) | Apparatuses and a method for protecting a bootstrap message in a network | |
MX2014015354A (en) | Session establishment method, server, device, system and apparatus. | |
IN2014DN10973A (en) | ||
MX2012002367A (en) | Method and apparatus for dynamic password verification. | |
GB2490407B (en) | Joint encryption of data | |
IN2013MN01146A (en) | ||
IN2014KN02750A (en) | ||
EP2282443A4 (en) | A cryptographic key generating method, device and system | |
WO2012087692A3 (en) | System and method for secure communications in a communication system | |
AR081175A1 (en) | APPARATUS AND METHOD FOR SENALIZING THE INCREASED SECURITY CONTEXT FOR SESSION ENCRYPTION AND INTEGRITY KEYS | |
MX2012011985A (en) | Apparatus and method for signaling enhanced security context for session encryption and integrity keys. |