SG10201609247YA - System and method for configuring a wireless device for wireless network access - Google Patents

System and method for configuring a wireless device for wireless network access

Info

Publication number
SG10201609247YA
SG10201609247YA SG10201609247YA SG10201609247YA SG10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA SG 10201609247Y A SG10201609247Y A SG 10201609247YA
Authority
SG
Singapore
Prior art keywords
wireless device
configuring
wireless network
wireless
network access
Prior art date
Application number
SG10201609247YA
Inventor
Jie Shi
Chengfang Fang
Guilin Wang
Original Assignee
Huawei Int Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Int Pte Ltd filed Critical Huawei Int Pte Ltd
Priority to SG10201609247YA priority Critical patent/SG10201609247YA/en
Priority to PCT/SG2017/050357 priority patent/WO2018084802A1/en
Priority to EP17745535.9A priority patent/EP3529965B1/en
Priority to CN201780068067.0A priority patent/CN109923830B/en
Publication of SG10201609247YA publication Critical patent/SG10201609247YA/en
Priority to US16/403,110 priority patent/US10812969B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

SYSTEM AND METHOD FOR CONFIGURING A WIRELESS DEVICE FOR WIRELESS NETWORK ACCESS This document describes a system and method for configuring a second wireless device to access a wireless network using a first wireless device whereby one-round key exchange protocol is adopted to share the wireless network’s configuration data with the second wireless device in an efficient and secure manner. FIGURE 1
SG10201609247YA 2016-11-04 2016-11-04 System and method for configuring a wireless device for wireless network access SG10201609247YA (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SG10201609247YA SG10201609247YA (en) 2016-11-04 2016-11-04 System and method for configuring a wireless device for wireless network access
PCT/SG2017/050357 WO2018084802A1 (en) 2016-11-04 2017-07-18 System and method for configuring a wireless device for wireless network access
EP17745535.9A EP3529965B1 (en) 2016-11-04 2017-07-18 System and method for configuring a wireless device for wireless network access
CN201780068067.0A CN109923830B (en) 2016-11-04 2017-07-18 System and method for configuring wireless network access device
US16/403,110 US10812969B2 (en) 2016-11-04 2019-05-03 System and method for configuring a wireless device for wireless network access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201609247YA SG10201609247YA (en) 2016-11-04 2016-11-04 System and method for configuring a wireless device for wireless network access

Publications (1)

Publication Number Publication Date
SG10201609247YA true SG10201609247YA (en) 2018-06-28

Family

ID=59416771

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201609247YA SG10201609247YA (en) 2016-11-04 2016-11-04 System and method for configuring a wireless device for wireless network access

Country Status (5)

Country Link
US (1) US10812969B2 (en)
EP (1) EP3529965B1 (en)
CN (1) CN109923830B (en)
SG (1) SG10201609247YA (en)
WO (1) WO2018084802A1 (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014143776A2 (en) 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Providing remote interactions with host device using a wireless device
TWI647608B (en) 2014-07-21 2019-01-11 美商蘋果公司 Remote user interface
WO2016036541A2 (en) 2014-09-02 2016-03-10 Apple Inc. Phone user interface
WO2016036603A1 (en) 2014-09-02 2016-03-10 Apple Inc. Reduced size configuration interface
US10216351B2 (en) 2015-03-08 2019-02-26 Apple Inc. Device configuration user interface
US10812974B2 (en) * 2017-05-06 2020-10-20 Vmware, Inc. Virtual desktop client connection continuity
US20220279063A1 (en) 2017-05-16 2022-09-01 Apple Inc. Methods and interfaces for home media control
CN111343060B (en) 2017-05-16 2022-02-11 苹果公司 Method and interface for home media control
US10887193B2 (en) * 2018-06-03 2021-01-05 Apple Inc. User interfaces for updating network connection settings of external devices
US11483708B2 (en) * 2019-02-20 2022-10-25 Apple Inc. Network access tokens for accessories
JP6921338B2 (en) 2019-05-06 2021-08-18 アップル インコーポレイテッドApple Inc. Limited operation of electronic devices
DK201970533A1 (en) 2019-05-31 2021-02-15 Apple Inc Methods and user interfaces for sharing audio
KR20240049648A (en) 2019-05-31 2024-04-16 애플 인크. User interfaces for audio media control
KR20220131361A (en) * 2019-05-31 2022-09-27 애플 인크. Methods and user interfaces for sharing audio
US11010121B2 (en) 2019-05-31 2021-05-18 Apple Inc. User interfaces for audio media control
US11240661B2 (en) * 2019-09-03 2022-02-01 Cisco Technology, Inc. Secure simultaneous authentication of equals anti-clogging mechanism
CN112566113B (en) * 2019-09-06 2023-04-07 阿里巴巴集团控股有限公司 Key generation and terminal network distribution method, device and equipment
CN113301563A (en) * 2020-02-05 2021-08-24 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and storage medium
WO2021211314A1 (en) * 2020-04-15 2021-10-21 Google Llc Three-party cryptographic handshake protocol
US11079913B1 (en) 2020-05-11 2021-08-03 Apple Inc. User interface for status indicators
CN114125832B (en) * 2020-08-31 2023-07-14 Oppo广东移动通信有限公司 Network connection method, terminal, network equipment to be distributed and storage medium
US11392291B2 (en) 2020-09-25 2022-07-19 Apple Inc. Methods and interfaces for media control with dynamic feedback
WO2022109940A1 (en) * 2020-11-26 2022-06-02 华为技术有限公司 Security authentication method and apparatus applied to wi-fi
US11847378B2 (en) 2021-06-06 2023-12-19 Apple Inc. User interfaces for audio routing
CN114793178B (en) * 2022-05-07 2023-02-17 北京百度网讯科技有限公司 Network distribution method, device, equipment and storage medium

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7010692B2 (en) * 1996-04-17 2006-03-07 Phoenix Technologies Ltd. Cryptographic methods for remote authentication
US6226383B1 (en) * 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
US7139917B2 (en) * 2000-06-05 2006-11-21 Phoenix Technologies Ltd. Systems, methods and software for remote password authentication using multiple servers
US7284127B2 (en) 2002-10-24 2007-10-16 Telefonktiebolaget Lm Ericsson (Publ) Secure communications
US8364964B2 (en) * 2009-12-29 2013-01-29 General Instrument Corporation Registering client devices with a registration server
CN103621127B (en) 2011-05-04 2019-04-19 马维尔国际贸易有限公司 For the access point controller of wireless authentication, method and integrated circuit
US8813198B2 (en) 2011-07-05 2014-08-19 Apple Inc. Configuration of accessories for wireless network access
US9565558B2 (en) * 2011-10-21 2017-02-07 At&T Intellectual Property I, L.P. Securing communications of a wireless access point and a mobile device
CN103379477B (en) 2012-04-18 2016-03-09 深圳紫煌网络科技有限公司 The method of network configuration, device, wireless device and terminal are carried out to wireless device
US9363249B2 (en) * 2013-03-06 2016-06-07 Marvell World Trade Ltd. Secure simple enrollment
US9215075B1 (en) * 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
WO2014200691A1 (en) 2013-06-10 2014-12-18 Apple Inc. Configuring wireless accessory devices
JP2016526851A (en) * 2013-07-12 2016-09-05 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. System for sharing encryption keys
US9350550B2 (en) * 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US10498530B2 (en) * 2013-09-27 2019-12-03 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
WO2015062904A1 (en) * 2013-10-28 2015-05-07 Kmaas Aps A system and a method for management of confidential data
WO2015061992A1 (en) * 2013-10-30 2015-05-07 华为终端有限公司 Key configuration method, system and apparatus
US10700856B2 (en) * 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
CN103780618B (en) * 2014-01-22 2016-11-09 西南交通大学 A kind of based on across the isomery territory authentication accessing mandate bill and session cipher negotiating method
CN103825733A (en) * 2014-02-28 2014-05-28 华为技术有限公司 Communication method, device and system based on combined public key cryptography system
CN103986575B (en) * 2014-06-05 2017-04-12 武汉大学 Asymmetric calculation type shared key establishing method
DK2955871T3 (en) * 2014-06-12 2017-05-01 Nagravision Sa Cryptographic method for securely exchanging messages and apparatus and system for performing this method
US9544767B2 (en) * 2014-07-21 2017-01-10 Imagination Technologies Limited Encryption key updates in wireless communication systems
US9600949B2 (en) * 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
CN104378801A (en) 2014-09-19 2015-02-25 小米科技有限责任公司 Method and device for having access to wireless network
WO2016062782A2 (en) * 2014-10-21 2016-04-28 Nec Europe Ltd. Method for provably secure erasure of data
US9774451B2 (en) * 2015-02-10 2017-09-26 Qualcomm Incorporated Using secure elements to authenticate devices in point-to-point communication
US10020939B2 (en) * 2015-04-28 2018-07-10 Korea University Research And Business Foundation Device, server and method for providing secret key encryption and restoration
CN105119939B (en) 2015-09-14 2019-01-15 北京奇虎科技有限公司 The cut-in method and device, providing method and device and system of wireless network
WO2017132136A1 (en) * 2016-01-26 2017-08-03 Google Inc. Secure connections for low-power devices
US11170094B2 (en) * 2016-01-27 2021-11-09 Secret Double Octopus Ltd. System and method for securing a communication channel
US10979412B2 (en) * 2016-03-08 2021-04-13 Nxp Usa, Inc. Methods and apparatus for secure device authentication
US20170324549A1 (en) * 2016-05-06 2017-11-09 Benny Abramovsky Secured time of flight measurement
RU2018145757A (en) * 2016-06-07 2020-07-09 Виза Интернэшнл Сервис Ассосиэйшн MULTILEVEL MESSAGE ENCRYPTION
US10129223B1 (en) * 2016-11-23 2018-11-13 Amazon Technologies, Inc. Lightweight encrypted communication protocol
EP3748900A1 (en) * 2017-03-01 2020-12-09 Apple Inc. System access using a mobile device
US10819510B2 (en) * 2018-02-06 2020-10-27 Wickr Inc. Facilitating communications using hybrid cryptography
US10841086B2 (en) * 2018-02-06 2020-11-17 Wickr, Inc. Facilitating communications using hybrid cryptography
US10169587B1 (en) * 2018-04-27 2019-01-01 John A. Nix Hosted device provisioning protocol with servers and a networked initiator

Also Published As

Publication number Publication date
EP3529965B1 (en) 2022-08-31
US20190261168A1 (en) 2019-08-22
CN109923830A (en) 2019-06-21
CN109923830B (en) 2022-01-14
WO2018084802A1 (en) 2018-05-11
US10812969B2 (en) 2020-10-20
EP3529965A1 (en) 2019-08-28

Similar Documents

Publication Publication Date Title
SG10201609247YA (en) System and method for configuring a wireless device for wireless network access
SG10201808299WA (en) Key Information Management Device, Key Information Management Method, And Non-Transitory Computer-Readable Recording Medium
TW201613399A (en) Method and apparatus for requesting resources in a wireless communication system
EP3499796A4 (en) Method for requesting authentication between terminal and 3rd party server in wireless communication system, terminal therefor, and network slice instance management device
MY191655A (en) Method for controlling transmission of data
MY187137A (en) Apparatus, system and method of securing communications of a user equipment (ue) in a wireless local area network
WO2015089318A3 (en) Secure communication channels
MX2019003356A (en) Secure communication of network traffic.
WO2014194843A3 (en) System and method for an agile wireless access network
MX354278B (en) Distance-dependent or user-dependent data exchange between wireless communication devices.
WO2015198157A3 (en) Method and device for transmitting data
BR112017000081A2 (en) eu-based network subscription management
MX359065B (en) Apparatus, system and method for dedicated core network.
MY182770A (en) Wireless device, network node, and methods therein for sending a message comprising one or more populated fields
MX2019001055A (en) Wireless telecommuncations methods and apparatus using system information value tag.
WO2017123362A3 (en) Key establishment for communications within a group
EP3826400A4 (en) Method for configuring resources for sidelink information, communication device and network device
PH12017501680A1 (en) Methods and arrangements for managing access information enabling a wireless device to access a wireless communication network
MY189128A (en) Information transmission/reception method and apparatus in wireless local area network
EP3874783A4 (en) Security management in disaggregated base station in communication system
EP3742632A4 (en) Device and method for generating environment information for network design in wireless communication system
GB202013868D0 (en) Management system, management method, power device, vehicle-mounted device, and management server
EP3404967A4 (en) Method for data transmission in wireless local area network, access point and station
GB2557100A (en) Method to generate and transmit role-specific audio snippets
MX2019003187A (en) System and methods for point to point encryption and tokenization using a mobile device.