Abstract:
The present invention provides a method involving a femtocell in communication with an Internet Protocol Multimedia Subsystem (IMS) network. In one embodiment, the femtocell operates according to code division multiple access (CDMA) standards. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, first authentication information generated by the mobile unit using a first random number broadcast by the femtocell in a global challenge. The method also includes receiving, from a second secure entity in the secure network, at least one security key formed based on the global challenge and second authentication information for uniquely challenging the mobile unit. In one embodiment, the second secure entity is a CDMA-based authentication server. The method further includes providing the security key(s) to the femtocell in response to authenticating the mobile unit based upon the second authentication information.
Abstract:
Methods are provided for securely transmitting a packet between' endpoints (120,140) of a- network. In one aspect, there is provided a method for establishing an end-to-end key using extant hop-by-hop security associations. In a second aspect, there is provided a method in which a packet-specific encryption key PEK is used to encrypt a packet p. A signature of the key PEK is independently computed at each of two, nodes, using an integrity key shared by the two nodes. The signature is sent from one of the two nodes to the other in association with the packet p. The receiving node uses the signature to verify that the packet p was originated by an entity having possession fo the PEK.
Abstract:
The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.
Abstract:
The present invention provides a method of key material generation for authenticating communication with at least one network application function. The method includes determining first key material in response to a bootstrapping key request and determining second key material in response to determining the first key material. The second key material corresponds to third key material, which is determined and provided to the at least one network application function in response to determining the first key material.
Abstract:
A method for wireless communications with mobile stations located within a femtocell is described. The method includes registering a femtocell with an IMS core network to receive IMS services for one or more mobile stations located within the femtocell, and separately registering the mobile station with an application server to provide additional services to the mobile station located within the femtocell. The additional services may be CDMA services. Also, registering the femtocell with the IMS core network may include transmitting femtocell registration information that does not include information regarding the mobile station to the IMS core network to request IMS services for the mobile station.
Abstract:
The present invention provides a method involving a femtocell in communication with a secure network. The method includes determining whether the femtocell is authorized to provide wireless connectivity to a mobile unit based on information stored in a secure entity in the secure network. The information has been confirmed by a user of the mobile unit.
Abstract:
In one embodiment, the method performed by mobile equipment (100) to authenticate communication with a network (400) includes generating keys using cellular authentication and voice encryption (S610, 620), and then generating an authentication key (S630) based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.
Abstract:
One example embodiment of the present invention discloses a method for processing an application packet for transmission, includes breaking the application packet into a plurality of segments, creating first pseudorandom bits, and generating partial tags based on each of the plurality of segments and portions of the first pseudorandom bits associated with each of the plurality of segments. The method further including combining the partial tags including a last partial tag associated with a last segment of the application packet to create an accumulated tag, generating an authentication tag based on the accumulated tag and second pseudorandom bits, storing the authentication tag, and transmitting the plurality of segments including the authentication tag.
Abstract:
Methods are provided for securely transmitting a packet between' endpoints (120,140) of a- network. In one aspect, there is provided a method for establishing an end-to-end key using extant hop-by-hop security associations. In a second aspect, there is provided a method in which a packet-specific encryption key PEK is used to encrypt a packet p. A signature of the key PEK is independently computed at each of two, nodes, using an integrity key shared by the two nodes. The signature is sent from one of the two nodes to the other in association with the packet p. The receiving node uses the signature to verify that the packet p was originated by an entity having possession fo the PEK.