Abstract:
Método para la transicion de un contexto de seguridad mejorada de una red de servicio basada en UTRAN a una red de servicio basada en GERAN. En el método, la estacion remota genera una primera y segunda claves de sesion, de acuerdo con el contexto de seguridad mejorada, utilizando una clave raíz de contexto de seguridad mejorada y un primer elemento de informacion. La estacion remota recibe un primer mensaje de la red de servicio basada en UTRAN. El primer mensaje incluye un segundo elemento de informacion que envía una senal a la estacion remota para generar una tercera y cuarta claves de sesion para utilizar con la red de servicio basada en GERAN. La estacion remota genera, en respuesta al primer mensaje, la tercera y cuarta claves de sesion utilizando el segundo elemento de informacion y las primera y segunda claves de sesion. La estacion remota protege comunicaciones inalámbricas, en la red de servicio basada en GERAN, basada en las tercera y cuarta claves de sesion.
Abstract:
El control de aprovisionamiento y acceso para nodos de comunicación implica asignar identificadores a conjuntos de nodos donde los identificadores se pueden utilizar para controlar el acceso a los nodos de acceso restringidos que proporcionan cierto servicio únicamente a ciertos conjuntos de nodos definidos. En algunos aspectos, el aprovisionamiento de un nodo puede implicar proporcionar un identificador único para los conjuntos de uno o más nodos tales como los puntos de acceso restringido y las terminales de acceso que están autorizadas para recibir el servicio desde los puntos de acceso restringidos. El control de acceso se puede proporcionar mediante la operación de un punto de acceso restringido y/o un nodo de la red. En algunos aspectos, el aprovisionamiento de un nodo implica proporcionar una lista de itinerancia preferida para el nodo. En algunos aspectos, se le puede suministrar a un nodo con una lista de itinerancia preferida a través del uso de una radiobaliza del programa de arranque.
Abstract:
El control de aprovisionamiento y acceso para nodos de comunicación implica asignar identificadores a conjuntos de nodos donde los identificadores se pueden utilizar para controlar el acceso a los nodos de acceso restringidos que proporcionan cierto servicio únicamente a ciertos conjuntos de nodos definidos. En algunos aspectos, el aprovisionamiento de un nodo puede implicar proporcionar un identificador único (402) para los conjuntos de uno o más nodos tales como los puntos de acceso restringido (102, 104) y las terminales de acceso (106, 108) que están autorizadas para recibir el servicio desde los puntos de acceso restringidos (102, 104). El control de acceso se puede proporcionar mediante la operación de un punto de acceso restringido y/o un nodo de la red (110). En algunos aspectos, el aprovisionamiento de un nodo implica proporcionar una lista de itinerancia preferida para el nodo. En algunos aspectos, se le puede suministrar a un nodo con una lista de itinerancia preferida a través del el uso de una radiobaliza del programa de arranque.
Abstract:
Aspects of security schemes (e.g., integrity protection, encryption, or both) are described. A measure of access stratum security can be realized without overhead associated with establishing and/or maintaining the per-cellular-device access stratum security context at a Cellular Internet of Things (CIoT) base station (C-BS). A gateway (e.g., a CIoT Serving Gateway Node (C-SGN)) may derive a first key. The first key may be only known to the C-SGN. The C-SGN may derive a second key from the first key and a parameter unique to the C-BS. The C-SGN may also derive a third key from the second key and an identity of a cellular device. The C-SGN may send the second and third keys to the C-BS and cellular device, respectively. Small data messages encrypted and/or integrity protected by the cellular device may be decrypted and/or verified by the C-BS.
Abstract:
Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
Abstract:
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access system lacking an over-the-air provisioning procedure. For example, the second access system may be a 3GPP system using AKA authentication methods. The first access system may be CDMA, using an OTASP or IOTA procedure. Provisioning the authentication credentials may include provisioning any of a 3GPP AKA authentication root key (K), AKA authentication related parameters, an AKA authentication algorithm to be used in the 3GPP authentication, or authentication algorithm customization parameters.
Abstract:
Methods, apparatus, and systems to perform secure registration of a femto access point for trusted access to an operator-controlled network element. Method steps include establishing a security association for at least one said femto access point, making a request using the security association to an operator-controlled network element, which requests a secure registration credential from an authorizing component. The operator-controlled network element constructs a secure registration credential and sends the secure registration credential to the requesting femto access point, thus authorizing trusted access by the requesting femto access point to access operator-controlled network elements. Embodiments include establishing a security association via an IPsec security association received from a security gateway which is within an operator-controlled domain and using an operator-controlled database of IPsec inner addresses. In some embodiments the femto access point conducts message exchanges using one or more IMS protocols and components, including call session control function elements, which elements in turn may authorize a femto access point within the IMS domain, may or access non-IMS network elements for authorization.
Abstract:
In an aspect, a network may support a number of client devices. In such a network, a client device transmits a request to communicate with a network, establishes a security context, and receives one or more encrypted client device contexts from the network. An encrypted client device context enables reconstruction of a context at the network for communication with the client device, where the context includes network state information associated with the client device. The client device transmits a message (e.g., including an uplink data packet) to the network that includes at least one encrypted client device context. Since the network device can reconstruct the context for the client device based on an encrypted client device context, the network device can reduce an amount of the context maintained at the network device in order to support a greater number of client devices.
Abstract:
Access by a mobile station to a femto access point (FAP) of a wireless communication system is controlled by an enforcement point in response to mobile station authorization data provided from a storage point that is remote from the FAP. The authorization data is provided in response to FAP authentication data. The authentication data may include a FAP identifier and a message authenticator that the FAP generates by hashing shared secret information. The storage point may provide the authorization data in response to determining that the message authenticator is a hash of the shared secret information.
Abstract:
Systems and methods for establishing secure communications between two network elements through a trusted intermediary when no direct communication path is available. Separate secure communication links are established between the network elements and the trusted intermediary to facilitate secure end to end communication.