-
公开(公告)号:DE602006008487D1
公开(公告)日:2009-09-24
申请号:DE602006008487
申请日:2006-09-08
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS , RAITH KRISTER , LEHTOVIRTA VESA , NORRMAN KARL
IPC: H04L9/12
Abstract: Methods for cryptographic synchronization of data packets. A roll-over counter (ROC) value is periodically appended to and transmitted with a data packet when a function of the packet sequence number equals a predetermined value. The ROC effectively synchronizes the cryptographic transformation of the data packets. Although the disclosed methods are generally applicable to many transmission protocols, they are particularly adaptable for use in systems wherein the data packets are transmitted to a receiver using the Secure Real-Time Transport Protocol (SRTP) as defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3711.
-
公开(公告)号:DE60316586D1
公开(公告)日:2007-11-08
申请号:DE60316586
申请日:2003-10-07
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS
-
公开(公告)号:DE60310968T2
公开(公告)日:2007-10-11
申请号:DE60310968
申请日:2003-09-17
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS , NORRMAN KARL , GOLDBECK-LOEWE TOMAS
Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.
-
公开(公告)号:CA2629370A1
公开(公告)日:2007-06-07
申请号:CA2629370
申请日:2005-12-01
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS
IPC: H04L9/08
Abstract: The present invention relates to arrangements and methods for generating keys for cryptographic processing of communication between a first communication unit (200) and a second communication unit (300). The first communication unit (200) and second communication unit (300) are adapted to obtain knowledge about a secret function, wherein the first communication unit comprises: - means for selecting a value z (210), means for calculating the secret function as a function of the selected value z (220) means for processing data with the calculated secret function (230), and means for transmitting the processed data in association with the selected z to the second communication unit (240), wherein the secret function is selected from a set of functions that are almost k-wise independent.
-
公开(公告)号:HK1095689A1
公开(公告)日:2007-05-11
申请号:HK07102582
申请日:2007-03-08
Applicant: ERICSSON TELEFON AB L M
Inventor: BLOM ROLF , NAESLUND MATS , ARKKO JARI
IPC: H04L20060101 , H04L9/00 , H04L9/08 , H04L9/32 , H04L29/06 , H04W20090101 , H04W12/00 , H04W12/02 , H04W12/04
Abstract: A basic idea according to the invention is to enhance or update the basic cryptographic security algorithms by an algorithm-specific modification of the security key information generated in the normal key agreement procedure of the mobile communication system. For communication with the mobile terminal, the network side normally selects an enhanced version of one of the basic cryptographic security algorithms supported by the mobile, and transmits information representative of the selected algorithm to the mobile terminal. The basic security key resulting from the key agreement procedure (AKA, 10) between the mobile terminal and the network is then modified (22) in dependence on the selected algorithm to generate an algorithm-specific security key. The basic security algorithm (24) is then applied with this algorithm-specific security key as key input to enhance security for protected communication in the mobile communications network.
-
公开(公告)号:DE60214836T2
公开(公告)日:2007-03-01
申请号:DE60214836
申请日:2002-04-10
Applicant: ERICSSON TELEFON AB L M
Inventor: LINDHOLM FREDRIK , BLOM ROLF , NORRMAN KARL , SELANDER GOERAN , NAESLUND MATS
Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.
-
公开(公告)号:DE60310968D1
公开(公告)日:2007-02-15
申请号:DE60310968
申请日:2003-09-17
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS , NORRMAN KARL , GOLDBECK-LOEWE TOMAS
Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.
-
公开(公告)号:HK1091338A1
公开(公告)日:2007-01-12
申请号:HK06111775
申请日:2006-10-25
Applicant: ERICSSON TELEFON AB L M
Inventor: LINDHOLM FREDRIK , NAESLUND MATS
IPC: H04L20100101 , H04L9/08 , H04L9/32 , H04L29/06
Abstract: The invention relates to password-based authentication in group networks. Each device has an authentication token irreversibly based on the password. The authentication involves a first device at which the password P is entered and a second device towards which the authentication occurs. The first device determines a check token Mj for the second based on the password and its own authentication token Rl and this check token is sent to the second device, where it is compared with the authentication token of that device. The procedure may include update of a device to exclude a non-trusted device from the group or change the password. Advantageous features are that the information in one device does not allow retrieval of the password and that the password is only exposed at one device, and only temporarily, during the authentication.
-
公开(公告)号:AT340471T
公开(公告)日:2006-10-15
申请号:AT02718765
申请日:2002-04-10
Applicant: ERICSSON TELEFON AB L M
Inventor: LINDHOLM FREDRIK , BLOM ROLF , NORRMAN KARL , SELANDER GOERAN , NAESLUND MATS
Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.
-
公开(公告)号:SE0202450D0
公开(公告)日:2002-08-15
申请号:SE0202450
申请日:2002-08-15
Applicant: ERICSSON TELEFON AB L M
Inventor: NAESLUND MATS , SELANDER GOERAN , BJOERKEGREN ULF
Abstract: The invention refers to monitoring usage of digital content provided from a content provider over a network to a client system. In the client system, a logging agent generates and stores information concerning usage of the digital content individually for each usage to be monitored. The generated information is entered in a usage log, either stored in the client system or at a trusted party. The logged usage information is also authenticated allowing identification of the client using the associated digital content. The entries of the log may include a representation of the content, information about usage quality and/or usage time. The logging agent is preferably implemented in a portable tamper-resistant module, e.g. a network subscriber identity module. The module may be pre-manufactured with the logging agent, or the agent can be downloaded thereto.
-
-
-
-
-
-
-
-
-