SG10201609247YA - System and method for configuring a wireless device for wireless network access - Google Patents
System and method for configuring a wireless device for wireless network accessInfo
- Publication number
- SG10201609247YA SG10201609247YA SG10201609247YA SG10201609247YA SG10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA
- Authority
- SG
- Singapore
- Prior art keywords
- wireless device
- configuring
- wireless network
- wireless
- network access
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
SYSTEM AND METHOD FOR CONFIGURING A WIRELESS DEVICE FOR WIRELESS NETWORK ACCESS This document describes a system and method for configuring a second wireless device to access a wireless network using a first wireless device whereby one-round key exchange protocol is adopted to share the wireless network’s configuration data with the second wireless device in an efficient and secure manner. FIGURE 1
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201609247YA SG10201609247YA (en) | 2016-11-04 | 2016-11-04 | System and method for configuring a wireless device for wireless network access |
PCT/SG2017/050357 WO2018084802A1 (en) | 2016-11-04 | 2017-07-18 | System and method for configuring a wireless device for wireless network access |
EP17745535.9A EP3529965B1 (en) | 2016-11-04 | 2017-07-18 | System and method for configuring a wireless device for wireless network access |
CN201780068067.0A CN109923830B (en) | 2016-11-04 | 2017-07-18 | System and method for configuring wireless network access device |
US16/403,110 US10812969B2 (en) | 2016-11-04 | 2019-05-03 | System and method for configuring a wireless device for wireless network access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201609247YA SG10201609247YA (en) | 2016-11-04 | 2016-11-04 | System and method for configuring a wireless device for wireless network access |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201609247YA true SG10201609247YA (en) | 2018-06-28 |
Family
ID=59416771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201609247YA SG10201609247YA (en) | 2016-11-04 | 2016-11-04 | System and method for configuring a wireless device for wireless network access |
Country Status (5)
Country | Link |
---|---|
US (1) | US10812969B2 (en) |
EP (1) | EP3529965B1 (en) |
CN (1) | CN109923830B (en) |
SG (1) | SG10201609247YA (en) |
WO (1) | WO2018084802A1 (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014143776A2 (en) | 2013-03-15 | 2014-09-18 | Bodhi Technology Ventures Llc | Providing remote interactions with host device using a wireless device |
TWI647608B (en) | 2014-07-21 | 2019-01-11 | 美商蘋果公司 | Remote user interface |
WO2016036541A2 (en) | 2014-09-02 | 2016-03-10 | Apple Inc. | Phone user interface |
WO2016036603A1 (en) | 2014-09-02 | 2016-03-10 | Apple Inc. | Reduced size configuration interface |
US10216351B2 (en) | 2015-03-08 | 2019-02-26 | Apple Inc. | Device configuration user interface |
US10812974B2 (en) * | 2017-05-06 | 2020-10-20 | Vmware, Inc. | Virtual desktop client connection continuity |
US20220279063A1 (en) | 2017-05-16 | 2022-09-01 | Apple Inc. | Methods and interfaces for home media control |
CN111343060B (en) | 2017-05-16 | 2022-02-11 | 苹果公司 | Method and interface for home media control |
US10887193B2 (en) * | 2018-06-03 | 2021-01-05 | Apple Inc. | User interfaces for updating network connection settings of external devices |
US11483708B2 (en) * | 2019-02-20 | 2022-10-25 | Apple Inc. | Network access tokens for accessories |
JP6921338B2 (en) | 2019-05-06 | 2021-08-18 | アップル インコーポレイテッドApple Inc. | Limited operation of electronic devices |
DK201970533A1 (en) | 2019-05-31 | 2021-02-15 | Apple Inc | Methods and user interfaces for sharing audio |
KR20240049648A (en) | 2019-05-31 | 2024-04-16 | 애플 인크. | User interfaces for audio media control |
KR20220131361A (en) * | 2019-05-31 | 2022-09-27 | 애플 인크. | Methods and user interfaces for sharing audio |
US11010121B2 (en) | 2019-05-31 | 2021-05-18 | Apple Inc. | User interfaces for audio media control |
US11240661B2 (en) * | 2019-09-03 | 2022-02-01 | Cisco Technology, Inc. | Secure simultaneous authentication of equals anti-clogging mechanism |
CN112566113B (en) * | 2019-09-06 | 2023-04-07 | 阿里巴巴集团控股有限公司 | Key generation and terminal network distribution method, device and equipment |
CN113301563A (en) * | 2020-02-05 | 2021-08-24 | 阿里巴巴集团控股有限公司 | Network configuration method, device, equipment and storage medium |
WO2021211314A1 (en) * | 2020-04-15 | 2021-10-21 | Google Llc | Three-party cryptographic handshake protocol |
US11079913B1 (en) | 2020-05-11 | 2021-08-03 | Apple Inc. | User interface for status indicators |
CN114125832B (en) * | 2020-08-31 | 2023-07-14 | Oppo广东移动通信有限公司 | Network connection method, terminal, network equipment to be distributed and storage medium |
US11392291B2 (en) | 2020-09-25 | 2022-07-19 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
WO2022109940A1 (en) * | 2020-11-26 | 2022-06-02 | 华为技术有限公司 | Security authentication method and apparatus applied to wi-fi |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
CN114793178B (en) * | 2022-05-07 | 2023-02-17 | 北京百度网讯科技有限公司 | Network distribution method, device, equipment and storage medium |
Family Cites Families (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7010692B2 (en) * | 1996-04-17 | 2006-03-07 | Phoenix Technologies Ltd. | Cryptographic methods for remote authentication |
US6226383B1 (en) * | 1996-04-17 | 2001-05-01 | Integrity Sciences, Inc. | Cryptographic methods for remote authentication |
US7139917B2 (en) * | 2000-06-05 | 2006-11-21 | Phoenix Technologies Ltd. | Systems, methods and software for remote password authentication using multiple servers |
US7284127B2 (en) | 2002-10-24 | 2007-10-16 | Telefonktiebolaget Lm Ericsson (Publ) | Secure communications |
US8364964B2 (en) * | 2009-12-29 | 2013-01-29 | General Instrument Corporation | Registering client devices with a registration server |
CN103621127B (en) | 2011-05-04 | 2019-04-19 | 马维尔国际贸易有限公司 | For the access point controller of wireless authentication, method and integrated circuit |
US8813198B2 (en) | 2011-07-05 | 2014-08-19 | Apple Inc. | Configuration of accessories for wireless network access |
US9565558B2 (en) * | 2011-10-21 | 2017-02-07 | At&T Intellectual Property I, L.P. | Securing communications of a wireless access point and a mobile device |
CN103379477B (en) | 2012-04-18 | 2016-03-09 | 深圳紫煌网络科技有限公司 | The method of network configuration, device, wireless device and terminal are carried out to wireless device |
US9363249B2 (en) * | 2013-03-06 | 2016-06-07 | Marvell World Trade Ltd. | Secure simple enrollment |
US9215075B1 (en) * | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
WO2014200691A1 (en) | 2013-06-10 | 2014-12-18 | Apple Inc. | Configuring wireless accessory devices |
JP2016526851A (en) * | 2013-07-12 | 2016-09-05 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | System for sharing encryption keys |
US9350550B2 (en) * | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
US10498530B2 (en) * | 2013-09-27 | 2019-12-03 | Network-1 Technologies, Inc. | Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys |
WO2015062904A1 (en) * | 2013-10-28 | 2015-05-07 | Kmaas Aps | A system and a method for management of confidential data |
WO2015061992A1 (en) * | 2013-10-30 | 2015-05-07 | 华为终端有限公司 | Key configuration method, system and apparatus |
US10700856B2 (en) * | 2013-11-19 | 2020-06-30 | Network-1 Technologies, Inc. | Key derivation for a module using an embedded universal integrated circuit card |
CN103780618B (en) * | 2014-01-22 | 2016-11-09 | 西南交通大学 | A kind of based on across the isomery territory authentication accessing mandate bill and session cipher negotiating method |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
CN103986575B (en) * | 2014-06-05 | 2017-04-12 | 武汉大学 | Asymmetric calculation type shared key establishing method |
DK2955871T3 (en) * | 2014-06-12 | 2017-05-01 | Nagravision Sa | Cryptographic method for securely exchanging messages and apparatus and system for performing this method |
US9544767B2 (en) * | 2014-07-21 | 2017-01-10 | Imagination Technologies Limited | Encryption key updates in wireless communication systems |
US9600949B2 (en) * | 2014-07-30 | 2017-03-21 | Master Lock Company Llc | Wireless key management for authentication |
CN104378801A (en) | 2014-09-19 | 2015-02-25 | 小米科技有限责任公司 | Method and device for having access to wireless network |
WO2016062782A2 (en) * | 2014-10-21 | 2016-04-28 | Nec Europe Ltd. | Method for provably secure erasure of data |
US9774451B2 (en) * | 2015-02-10 | 2017-09-26 | Qualcomm Incorporated | Using secure elements to authenticate devices in point-to-point communication |
US10020939B2 (en) * | 2015-04-28 | 2018-07-10 | Korea University Research And Business Foundation | Device, server and method for providing secret key encryption and restoration |
CN105119939B (en) | 2015-09-14 | 2019-01-15 | 北京奇虎科技有限公司 | The cut-in method and device, providing method and device and system of wireless network |
WO2017132136A1 (en) * | 2016-01-26 | 2017-08-03 | Google Inc. | Secure connections for low-power devices |
US11170094B2 (en) * | 2016-01-27 | 2021-11-09 | Secret Double Octopus Ltd. | System and method for securing a communication channel |
US10979412B2 (en) * | 2016-03-08 | 2021-04-13 | Nxp Usa, Inc. | Methods and apparatus for secure device authentication |
US20170324549A1 (en) * | 2016-05-06 | 2017-11-09 | Benny Abramovsky | Secured time of flight measurement |
RU2018145757A (en) * | 2016-06-07 | 2020-07-09 | Виза Интернэшнл Сервис Ассосиэйшн | MULTILEVEL MESSAGE ENCRYPTION |
US10129223B1 (en) * | 2016-11-23 | 2018-11-13 | Amazon Technologies, Inc. | Lightweight encrypted communication protocol |
EP3748900A1 (en) * | 2017-03-01 | 2020-12-09 | Apple Inc. | System access using a mobile device |
US10819510B2 (en) * | 2018-02-06 | 2020-10-27 | Wickr Inc. | Facilitating communications using hybrid cryptography |
US10841086B2 (en) * | 2018-02-06 | 2020-11-17 | Wickr, Inc. | Facilitating communications using hybrid cryptography |
US10169587B1 (en) * | 2018-04-27 | 2019-01-01 | John A. Nix | Hosted device provisioning protocol with servers and a networked initiator |
-
2016
- 2016-11-04 SG SG10201609247YA patent/SG10201609247YA/en unknown
-
2017
- 2017-07-18 WO PCT/SG2017/050357 patent/WO2018084802A1/en unknown
- 2017-07-18 EP EP17745535.9A patent/EP3529965B1/en active Active
- 2017-07-18 CN CN201780068067.0A patent/CN109923830B/en active Active
-
2019
- 2019-05-03 US US16/403,110 patent/US10812969B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3529965B1 (en) | 2022-08-31 |
US20190261168A1 (en) | 2019-08-22 |
CN109923830A (en) | 2019-06-21 |
CN109923830B (en) | 2022-01-14 |
WO2018084802A1 (en) | 2018-05-11 |
US10812969B2 (en) | 2020-10-20 |
EP3529965A1 (en) | 2019-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201609247YA (en) | System and method for configuring a wireless device for wireless network access | |
SG10201808299WA (en) | Key Information Management Device, Key Information Management Method, And Non-Transitory Computer-Readable Recording Medium | |
TW201613399A (en) | Method and apparatus for requesting resources in a wireless communication system | |
EP3499796A4 (en) | Method for requesting authentication between terminal and 3rd party server in wireless communication system, terminal therefor, and network slice instance management device | |
MY191655A (en) | Method for controlling transmission of data | |
MY187137A (en) | Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network | |
WO2015089318A3 (en) | Secure communication channels | |
MX2019003356A (en) | Secure communication of network traffic. | |
WO2014194843A3 (en) | System and method for an agile wireless access network | |
MX354278B (en) | Distance-dependent or user-dependent data exchange between wireless communication devices. | |
WO2015198157A3 (en) | Method and device for transmitting data | |
BR112017000081A2 (en) | eu-based network subscription management | |
MX359065B (en) | Apparatus, system and method for dedicated core network. | |
MY182770A (en) | Wireless device, network node, and methods therein for sending a message comprising one or more populated fields | |
MX2019001055A (en) | Wireless telecommuncations methods and apparatus using system information value tag. | |
WO2017123362A3 (en) | Key establishment for communications within a group | |
EP3826400A4 (en) | Method for configuring resources for sidelink information, communication device and network device | |
PH12017501680A1 (en) | Methods and arrangements for managing access information enabling a wireless device to access a wireless communication network | |
MY189128A (en) | Information transmission/reception method and apparatus in wireless local area network | |
EP3874783A4 (en) | Security management in disaggregated base station in communication system | |
EP3742632A4 (en) | Device and method for generating environment information for network design in wireless communication system | |
GB202013868D0 (en) | Management system, management method, power device, vehicle-mounted device, and management server | |
EP3404967A4 (en) | Method for data transmission in wireless local area network, access point and station | |
GB2557100A (en) | Method to generate and transmit role-specific audio snippets | |
MX2019003187A (en) | System and methods for point to point encryption and tokenization using a mobile device. |