-
公开(公告)号:ES2384634T3
公开(公告)日:2012-07-10
申请号:ES11161433
申请日:2004-09-10
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS , ARKKO JARI
Abstract: Un método de mejora de la seguridad para una comunicación protegida basada en un procedimiento de acuerdo de clave (S 1) en una red de comunicaciones de móviles que presta servicio a un terminal móvil (100) que tiene por lo menos un algoritmo de seguridad criptográfico básico (24), comprendiendo dicho método las etapas de: - seleccionar una versión mejorada de un algoritmo de seguridad criptográfico básico para la comunicación entre el terminal móvil (100) y el lado de la red (S2); - modificar una clave de seguridad básica resultante del procedimiento de acuerdo de clave en función de un identificador de algoritmo que identifica la versión mejorada seleccionada del algoritmo de seguridad para generar una clave de seguridad específica de algoritmo (S3); - aplicar el algoritmo de seguridad criptográfico básico con la clave de seguridad específica del algoritmo como entrada de clave para mejorar la seguridad para la comunicación protegida en dicha red de comunicaciones de móviles (S4).
-
公开(公告)号:DK1671511T3
公开(公告)日:2011-10-03
申请号:DK04775405
申请日:2004-09-10
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS , ARKKO JARI
-
公开(公告)号:AT514294T
公开(公告)日:2011-07-15
申请号:AT04775405
申请日:2004-09-10
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS , ARKKO JARI
Abstract: A basic idea according to the invention is to enhance or update the basic cryptographic security algorithms by an algorithm-specific modification of the security key information generated in the normal key agreement procedure of the mobile communication system. For communication with the mobile terminal, the network side normally selects an enhanced version of one of the basic cryptographic security algorithms supported by the mobile, and transmits information representative of the selected algorithm to the mobile terminal. The basic security key resulting from the key agreement procedure (AKA, 10) between the mobile terminal and the network is then modified (22) in dependence on the selected algorithm to generate an algorithm-specific security key. The basic security algorithm (24) is then applied with this algorithm-specific security key as key input to enhance security for protected communication in the mobile communications network.
-
公开(公告)号:AT494693T
公开(公告)日:2011-01-15
申请号:AT03721219
申请日:2003-04-16
Applicant: ERICSSON TELEFON AB L M
Inventor: LINDHOLM FREDRIK , NAESLUND MATS
Abstract: The invention relates to password-based authentication in group networks. Each device has an authentication token irreversibly based on the password. The authentication involves a first device at which the password P is entered and a second device towards which the authentication occurs. The first device determines a check token Mj for the second based on the password and its own authentication token Rl and this check token is sent to the second device, where it is compared with the authentication token of that device. The procedure may include update of a device to exclude a non-trusted device from the group or change the password. Advantageous features are that the information in one device does not allow retrieval of the password and that the password is only exposed at one device, and only temporarily, during the authentication.
-
公开(公告)号:AT493827T
公开(公告)日:2011-01-15
申请号:AT07804610
申请日:2007-07-13
Applicant: ERICSSON TELEFON AB L M
Inventor: HADDAD WASSIM , NAESLUND MATS , MEHES ANDRAS
-
46.
公开(公告)号:DE60335112D1
公开(公告)日:2011-01-05
申请号:DE60335112
申请日:2003-04-25
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS , SELANDER GOERAN , BJOERKENGREN ULF
-
公开(公告)号:DE60320322T2
公开(公告)日:2009-06-18
申请号:DE60320322
申请日:2003-12-24
Applicant: ERICSSON TELEFON AB L M
Inventor: ARKKO JARI , NIKANDER PEKKA , NAESLUND MATS
Abstract: A method of authenticating a mobile node to a communication system is provided, the communication system comprising a plurality of access nodes, the method comprising the steps of (a) generating a numerical chain comprising a seriesof values using a one-way coding function such that a given value within the chain is easily obtainable from a subsequent value, but the subsequent value is not easily obtainable from that given value; (b) sending a value from the first numerical chain from the mobile node to an access node to which the mobile node wishes to attach; and (c) using the sent value at the access node to authenticate the mobile node.
-
公开(公告)号:DE602005013776D1
公开(公告)日:2009-05-20
申请号:DE602005013776
申请日:2005-05-17
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS
Abstract: When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile terminal has an executable program (14) configured to interact with the basic identity module for emulating an identity module according to the second security standard. If it is concluded that the mobile terminal has such an executable program, a security algorithm is executed at the home network (30) to provide security data according to the second security standard. At least part of these security data are then transferred, transparently to a visited network (20), to the mobile terminal (10). On the mobile terminal side, the executable program (14) is executed for emulating an identity module according to the second security standard using at least part of the transferred security data as input. Preferably, the first security standard corresponds to a 2G standard, basically the GSM standard and the second security standard at least in part corresponds to a 3G standard such as the UMTS standard, and/or the IP Multimedia Sub-system (IMS) standard.
-
公开(公告)号:HK1101624A1
公开(公告)日:2007-10-18
申请号:HK07106273
申请日:2007-06-12
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS , CARRARA ELISABETTA , LINDHOLM FREDRIK , NORRMAN KARL
IPC: H04L20060101 , H04L9/00 , H04L9/08
Abstract: The invention provides an establishment of a secret session key shared between two network elements (NEa, NEb) belonging to different network domains (NDa, NDb). A first network element (NEa) of a first network domain (NDa) requests security parameters from an associated key management center (KMC) (AAAa). Upon reception of the request, the KMC (AAAa) generates a freshness token (FRESH) and calculates the session key (K) based on this token (FRESH) and a master key (KAB) shared with a second network domain (NDb). The security parameters are (securely) provided to the network element (NEa), which extracts the session key (K) and forwards the freshness token (FRESH) to the KMC (AAAb) of the second domain (NDb) through a second network element (NEb). Based on the token (FRESH) and the shared master key (KAB), the KMC (AAAb) generates a copy of the session key (K), which is (securely) provided to the second network element (NEb). The two network elements (NEa, NEb) now have shares the session key (K), enabling them to securely communicate with each other.
-
公开(公告)号:DE60214836D1
公开(公告)日:2006-11-02
申请号:DE60214836
申请日:2002-04-10
Applicant: ERICSSON TELEFON AB L M
Inventor: LINDHOLM FREDRIK , BLOM ROLF , NORRMAN KARL , SELANDER GOERAN , NAESLUND MATS
Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.
-
-
-
-
-
-
-
-
-