TRUST DISCOVERY IN A COMMUNICATIONS NETWORK
    1.
    发明公开
    TRUST DISCOVERY IN A COMMUNICATIONS NETWORK 审中-公开
    SICHERHEITSBESTIMMUNG在EINEM KOMMUNIKATIONSNETZWERK

    公开(公告)号:EP2534809A4

    公开(公告)日:2016-11-09

    申请号:EP10845885

    申请日:2010-02-12

    CPC classification number: H04W12/06 H04L63/08 H04L63/0823

    Abstract: A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data.

    Abstract translation: 一种在通信网络中的两个节点之间建立信任的方法和装置。 第一节点从网络节点接收对第一节点唯一的认证数据,其可以用于导出用于第一节点的验证数据的紧凑表示。 第一个节点还接收网络中所有节点的验证数据的认证紧凑表示。 第一节点从节点的认证数据中导出信任信息,并向第二节点发送包含信任信息和认证数据的一部分的消息。 第二节点具有网络中所有节点的验证数据的认证紧凑表示的自己的副本,并使用网络中所有节点的验证数据的紧密表示和接收到的信任来验证来自第一节点的消息的真实性 信息和认证数据。

    METHOD AND APPARATUSES FOR END-TO-EDGE MEDIA PROTECTION IN AN IMS SYSTEM
    2.
    发明申请
    METHOD AND APPARATUSES FOR END-TO-EDGE MEDIA PROTECTION IN AN IMS SYSTEM 审中-公开
    IMS系统中端到端媒体保护的方法和设备

    公开(公告)号:WO2009068985A3

    公开(公告)日:2009-11-26

    申请号:PCT/IB2008003288

    申请日:2008-12-01

    Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept. A method for supporting a call by a telecommunications node.

    Abstract translation: IMS系统包括IMS发起者用户实体。 该系统包括由发起者用户实体调用的IMS应答器用户实体。 该系统包括与主叫实体进行通信的主叫侧S-CSCF,其从呼叫方实体接收具有第一保护报价的INVITE和用于密钥建立的参数,从INVITE中移除第一保护报价并转发INVITE而没有第一保护 提供。 该系统包括与响应者用户实体通信的接收端S-CSCF,以及在没有第一保护提供的情况下接收INVITE的主叫侧S-CSCF,并检查响应者用户实体是否支持保护,将第二保护请求插入到 INVITE并将INVITE转发到响应者用户实体,其中响应者用户实体接受包括第二保护提议的INVITE和具有第一保护接受的确认的应答。 一种用于支持电信节点的呼叫的方法。

    APPLICATION SPECIFIC MASTER KEY SELECTION IN EVOLVED NETWORKS
    3.
    发明公开
    APPLICATION SPECIFIC MASTER KEY SELECTION IN EVOLVED NETWORKS 审中-公开
    应用特定的主密钥选择演进网络

    公开(公告)号:EP2245872A4

    公开(公告)日:2016-04-13

    申请号:EP08712808

    申请日:2008-02-15

    CPC classification number: H04L63/062 H04L12/06 H04L63/083 H04W12/06

    Abstract: An authentication method comprises providing a set of N plural number of master keys both to a user terminal (13) and to home network entity (11) and, when performing an authentication key agreement (AKA) transaction for an application, selecting one of the N number of master keys to serve as a master key for use both at the user terminal and the home network entity for deriving further keys for the application. For example, when performing an authentication key agreement (AKA) transaction for a first application, the method involves randomly selecting one of the N number of master keys to serve as a first master key for use both at the user terminal and the home network entity for deriving further keys for the first application; but when 10 performing an authentication key agreement (AKA) transaction for another application, the method involves randomly selecting another one of the N number of master keys to serve as master key for use both at the user terminal and the home network entity for deriving further keys for the another application.

    METHODS AND ARRANGEMENTS FOR DIRECT MODE COMMUNICATION
    9.
    发明公开
    METHODS AND ARRANGEMENTS FOR DIRECT MODE COMMUNICATION 有权
    方法和安排通信直接模式

    公开(公告)号:EP2586264A4

    公开(公告)日:2016-03-02

    申请号:EP10853763

    申请日:2010-06-22

    CPC classification number: H04W4/008 H04W76/023

    Abstract: A method in a first user equipment (UE 1) connectable to a second user equipment (UE 2) via a communication network or via a direct radio communication link, of using a direct radio communication link for communication between the UEs is initiated when one of the UEs receives probe signaling information comprising a first probe token via the communication network. The UEs exchange probe signaling messages including a second and/or the first probe token at least partly according to the probe signaling information, such that one of the UEs can compare the probe tokens, generate a probing report and provide the probing report to the communication network, or to the opposite UE for evaluation in case of a successful comparison and such that a direct radio communication link can be used for communication with UE 2 in response to receiving instructions to use the second direct radio communication link from the entity by which the probing report was evaluated.

    METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR DETERMINING PASSWORD STRENGTH
    10.
    发明公开
    METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR DETERMINING PASSWORD STRENGTH 审中-公开
    VERFAHREN,VORRICHTUNG UND COMPUTERPROGRAMMPRODUKT ZUR BESTIMMUNG DER PASSWORTSICHERHEIT

    公开(公告)号:EP2852912A4

    公开(公告)日:2016-01-13

    申请号:EP12877511

    申请日:2012-09-20

    CPC classification number: G06F21/46 G06F21/36

    Abstract: A method for estimating the strength of a graphical password comprising two or more segments is disclosed. In some embodiments, this advantageous solution is achieved by implementing a multi-step process. In one step, the data processing system applies a first operation on a first segment to produce a transformed segment. In another step, the data processing system performs a comparison operation between the transformed segment and a second segment. In another step, the data processing system performs a penalty operation with respect to the first segment based on an outcome of the comparison operation. The penalty operation includes one or more of (1) calculating a penalty value, wherein the penalty value may be used in calculating a value representing the strength of the graphical password; and (2) disregarding the first or the second segment when calculating the value representing the strength of the graphical password.

    Abstract translation: 公开了一种用于估计包括两个或多个片段的图形密码的强度的方法。 在一些实施例中,通过实施多步骤过程来实现该有利的解决方案。 在一个步骤中,数据处理系统对第一段应用第一操作以产生转换段。 在另一步骤中,数据处理系统在变换的段和第二段之间执行比较操作。 在另一步骤中,数据处理系统基于比较操作的结果对第一段执行惩罚操作。 惩罚操作包括(1)计算惩罚值中的一个或多个,其中惩罚值可以用于计算表示图形密码的强度的值; 和(2)当计算表示图形密码的强度的值时,不考虑第一或第二段。

Patent Agency Ranking