Key delivery method involving double acknowledgement

    公开(公告)号:GB2423221A

    公开(公告)日:2006-08-16

    申请号:GB0502888

    申请日:2005-02-14

    Abstract: An encrypted service key, MSK, is sent from an access server, BM-SC, of a communications network to a user terminal, ME. The user terminal is preferably a mobile phone. The encrypted service is passed to a secure module of the user terminal, UICC (step 2). The secure module has access to a decryption key, MUK, for decrypting the encrypted service key. An acknowledgment of receipt of the service key is sent from the user terminal to the access server (step 3). The access server authenticates the acknowledgment and sends a return acknowledgment to the user terminal (steps 4 and 5). The secure module of the user terminal then authenticates the return acknowledgment before allowing the user terminal to use the service key. The service key may be used to decrypt a traffic key (steps 6 and 7), which can in turn be used to access broadcast or multicast data. Preferably, the user terminal is not charged for provision of the service key until the access server receives the acknowledgment from the user terminal. A shared symmetric key, MUK (agreed in step 1), may preferably be used to encrypt and decrypt the service key and to authenticate both acknowledgments.

    Recovery in mobile communication systems

    公开(公告)号:AU770164B2

    公开(公告)日:2004-02-12

    申请号:AU4747500

    申请日:2000-04-14

    Abstract: The present invention relates to a method of recovering from a processor fault in a mobile communication network node provided with a plurality of processors. In use, connections are established between the network node and mobile stations for packet data communication between the network node and the mobile station. The connections are classified into priority order on basis of predefined classifying parameters. Working condition of at least one of the processors of the network node is monitored, and in case of detecting a processor fault, user plane connections are relocated within the network node from the faulted processor to another processor in accordance with the classified priority order of the connections. The invention relates further to a network node.

Patent Agency Ranking