Diseño de seguridad mejorado para criptografía en sistemas de comunicaciones de móviles

    公开(公告)号:ES2384634T3

    公开(公告)日:2012-07-10

    申请号:ES11161433

    申请日:2004-09-10

    Abstract: Un método de mejora de la seguridad para una comunicación protegida basada en un procedimiento de acuerdo de clave (S 1) en una red de comunicaciones de móviles que presta servicio a un terminal móvil (100) que tiene por lo menos un algoritmo de seguridad criptográfico básico (24), comprendiendo dicho método las etapas de: - seleccionar una versión mejorada de un algoritmo de seguridad criptográfico básico para la comunicación entre el terminal móvil (100) y el lado de la red (S2); - modificar una clave de seguridad básica resultante del procedimiento de acuerdo de clave en función de un identificador de algoritmo que identifica la versión mejorada seleccionada del algoritmo de seguridad para generar una clave de seguridad específica de algoritmo (S3); - aplicar el algoritmo de seguridad criptográfico básico con la clave de seguridad específica del algoritmo como entrada de clave para mejorar la seguridad para la comunicación protegida en dicha red de comunicaciones de móviles (S4).

    43.
    发明专利
    未知

    公开(公告)号:AT514294T

    公开(公告)日:2011-07-15

    申请号:AT04775405

    申请日:2004-09-10

    Abstract: A basic idea according to the invention is to enhance or update the basic cryptographic security algorithms by an algorithm-specific modification of the security key information generated in the normal key agreement procedure of the mobile communication system. For communication with the mobile terminal, the network side normally selects an enhanced version of one of the basic cryptographic security algorithms supported by the mobile, and transmits information representative of the selected algorithm to the mobile terminal. The basic security key resulting from the key agreement procedure (AKA, 10) between the mobile terminal and the network is then modified (22) in dependence on the selected algorithm to generate an algorithm-specific security key. The basic security algorithm (24) is then applied with this algorithm-specific security key as key input to enhance security for protected communication in the mobile communications network.

    44.
    发明专利
    未知

    公开(公告)号:AT494693T

    公开(公告)日:2011-01-15

    申请号:AT03721219

    申请日:2003-04-16

    Abstract: The invention relates to password-based authentication in group networks. Each device has an authentication token irreversibly based on the password. The authentication involves a first device at which the password P is entered and a second device towards which the authentication occurs. The first device determines a check token Mj for the second based on the password and its own authentication token Rl and this check token is sent to the second device, where it is compared with the authentication token of that device. The procedure may include update of a device to exclude a non-trusted device from the group or change the password. Advantageous features are that the information in one device does not allow retrieval of the password and that the password is only exposed at one device, and only temporarily, during the authentication.

    47.
    发明专利
    未知

    公开(公告)号:DE60320322T2

    公开(公告)日:2009-06-18

    申请号:DE60320322

    申请日:2003-12-24

    Abstract: A method of authenticating a mobile node to a communication system is provided, the communication system comprising a plurality of access nodes, the method comprising the steps of (a) generating a numerical chain comprising a seriesof values using a one-way coding function such that a given value within the chain is easily obtainable from a subsequent value, but the subsequent value is not easily obtainable from that given value; (b) sending a value from the first numerical chain from the mobile node to an access node to which the mobile node wishes to attach; and (c) using the sent value at the access node to authenticate the mobile node.

    48.
    发明专利
    未知

    公开(公告)号:DE602005013776D1

    公开(公告)日:2009-05-20

    申请号:DE602005013776

    申请日:2005-05-17

    Abstract: When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile terminal has an executable program (14) configured to interact with the basic identity module for emulating an identity module according to the second security standard. If it is concluded that the mobile terminal has such an executable program, a security algorithm is executed at the home network (30) to provide security data according to the second security standard. At least part of these security data are then transferred, transparently to a visited network (20), to the mobile terminal (10). On the mobile terminal side, the executable program (14) is executed for emulating an identity module according to the second security standard using at least part of the transferred security data as input. Preferably, the first security standard corresponds to a 2G standard, basically the GSM standard and the second security standard at least in part corresponds to a 3G standard such as the UMTS standard, and/or the IP Multimedia Sub-system (IMS) standard.

    KEY MANAGEMENT FOR NETWORK ELEMENTS

    公开(公告)号:HK1101624A1

    公开(公告)日:2007-10-18

    申请号:HK07106273

    申请日:2007-06-12

    Abstract: The invention provides an establishment of a secret session key shared between two network elements (NEa, NEb) belonging to different network domains (NDa, NDb). A first network element (NEa) of a first network domain (NDa) requests security parameters from an associated key management center (KMC) (AAAa). Upon reception of the request, the KMC (AAAa) generates a freshness token (FRESH) and calculates the session key (K) based on this token (FRESH) and a master key (KAB) shared with a second network domain (NDb). The security parameters are (securely) provided to the network element (NEa), which extracts the session key (K) and forwards the freshness token (FRESH) to the KMC (AAAb) of the second domain (NDb) through a second network element (NEb). Based on the token (FRESH) and the shared master key (KAB), the KMC (AAAb) generates a copy of the session key (K), which is (securely) provided to the second network element (NEb). The two network elements (NEa, NEb) now have shares the session key (K), enabling them to securely communicate with each other.

    50.
    发明专利
    未知

    公开(公告)号:DE60214836D1

    公开(公告)日:2006-11-02

    申请号:DE60214836

    申请日:2002-04-10

    Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.

Patent Agency Ranking