SECURE METHOD FOR GENERATING PASSWORD FUNCTION OUTPUT

    公开(公告)号:JP2000172175A

    公开(公告)日:2000-06-23

    申请号:JP31760399

    申请日:1999-11-09

    Abstract: PROBLEM TO BE SOLVED: To protect the security of an identity recognition process used in a communication system. SOLUTION: Data showing the use of pseudo random function output is used for correcting at least one numerical value used for generating pseudo random function output. An output control signal supplied to a user identification module(UIM) device 60 is used as input to a pseudo random function processor 64. Outputs supplied by the processor differ according to whether output is to be stored in a key storage area or it is to be transferred for using it at a place except for UIM. Thus, security is protected by securely varying the transferred numerical value or the numerical value existing in the output of a UIM module from the numerical value stored in the UIM module as a key value.

    AUTHENTICATION METHOD BY UPDATED KEY

    公开(公告)号:JP2000269959A

    公开(公告)日:2000-09-29

    申请号:JP31762899

    申请日:1999-11-09

    Abstract: PROBLEM TO BE SOLVED: To obtain an efficient authentication execution method that uses an authentication call sent to a terminal so as to supply information about the authentication, and to calculate an encryption key to the terminal. SOLUTION: A visiting authentication center obtains a random number RT, an authentication key KA, and an encryption key KC from a host authentication center. The visiting authentication center transmits a random number RT to a transmitter to update an authentication key and an encryption key of the terminal and calls the terminal as a part of an authentication process. The terminal calculates the authentication key KA and the encryption key KC by using the RT and replies the call from the visiting authentication center. In addition, a reply of a visiting network to the authentication call of the terminal to the network is checked by using the authentication key.

    VOICE ENCIPHERING CODER
    3.
    发明专利

    公开(公告)号:JP2000031941A

    公开(公告)日:2000-01-28

    申请号:JP16759799

    申请日:1999-06-15

    Abstract: PROBLEM TO BE SOLVED: To obtain a voice processor architecture which does not have to use an external cipher synchronous input, has minimum voice deterioration and also accomplishes improved confidentiality by including a block eneryptor (enciphering device) and a key (key) stream generator in a transmitter side and enciphering a voice bit that is encoded by it. SOLUTION: A class 1A bit (1st block) is supplied as an input to a block encryptor (enciphering device) 34 from a voice coder (encoder) 32 included in a transmitter 30, a class 1B bit (2nd block) is supplied as an input to an XOR operator 38 and a class 2B bit (3rd block) is supplied as an input to an XOR operator 40. The encryptor (enciphering device) 34 enciphers (encrypts) a plaintext of a block into a cipher text by using an inversely transformable encryption algorithm having a key (key) related to an intended receiver.

    AUTHENTICATION INTERCHANGE FUNCTION DEVICE FOR NETWORK USER

    公开(公告)号:JP2000013873A

    公开(公告)日:2000-01-14

    申请号:JP12611799

    申请日:1999-05-06

    Abstract: PROBLEM TO BE SOLVED: To realize the authentication interchange function AIF that can authenticate a roaming user in the case that the user roams between networks using different authentication systems. SOLUTION: An AIF 314 converts authentication systems or each family (IS-41, GSM, PDC) of a communication network. The AIF 314 is allocated to a HLR(home location register) of a home network or a VLR(vehicle location register) of a destination network or it can be realized as an independent IWF (inter working function). In the case that the user of a network adopting substantially the SSD authentication is roaming in a network adopting the triplet system, the AIF 314 generates the triplet from the current SSD.

    SECURE METHOD FOR GENERATING CRYPTOGRAPHIC FUNCTION OUTPUTS

    公开(公告)号:CA2285166A1

    公开(公告)日:2000-05-09

    申请号:CA2285166

    申请日:1999-10-07

    Abstract: Data that indicates the use of a pseudorandom function output is used to modify at least one value used to produce the pseudorandom function output. In one embodiment, the output control signals provided to a User Identity Module (UIM) device are used as inputs to a pseudorandom function processor. As a result, the output provided by the processor differs based on whether the output from the processor is going to be stored in a key storage area or exported for use outside the UIM. This technique solves the problem of the prior art by insuring that values that are exported or presented at the output of UIM module, are different than the values that are stored within the UIM module as key values. As a result, an attacker would receive values at the output of the UIM that are different than the values stored in the key storage unit and therefore, would not be able to impersonate the mobile terminal or compromise the privacy of the terminal's communications.

    METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION IN COMMUNICATION SYSTEMS

    公开(公告)号:CA2267589C

    公开(公告)日:2003-04-22

    申请号:CA2267589

    申请日:1999-03-29

    Abstract: A method and apparatus for permitting global roaming between two communication networks which utilize different authentication schemes. The authentication interoperability function (AIF) and method translate between the authentication schemes of each network, for example, a triplet-based network and a shared secret data (SSD) network. When a user from a network that natively uses SSD authentication roams into a triplet-based network, the authentication interoperability function produces triplets from the current SSD. When a triplet user roams into an SSD network, the AIF produces SSD from the triplet.

    METHOD FOR ESTABLISHING A KEY USING OVER-THE-AIR COMMUNICATION AND PASSWORD PROTOCOL AND PASSWORD PROTOCOL

    公开(公告)号:CA2277754A1

    公开(公告)日:2000-01-31

    申请号:CA2277754

    申请日:1999-07-20

    Abstract: In the password protocol, the communicating parties exchange calculation results, which each include an exponential, to generate a key. In generating the calculation results, each party adds the password to their respective exponential. If the authorizing information previously sent by one party is acceptable to the other party, then this other party uses the key established according to the password protocol. The channel authorizing information is slant over a secure communication channel. The secure communication channel is also used in other embodiments to verify a hash on at least one calculation result sent between the parties. If the hash is verified, then a key is established using the calculation results sent between the parties

    8.
    发明专利
    未知

    公开(公告)号:ID23025A

    公开(公告)日:2000-01-06

    申请号:ID990404

    申请日:1999-04-29

    Abstract: A method and apparatus for permitting global roaming between two communication networks which utilize different authentication schemes. The authentication interoperability function (AIF) and method translate between the authentication schemes of each network, for example, a triplet-based network and a shared secret data (SSD) network. When a user from a network that natively uses SSD authentication roams into a triplet-based network, the authentication interoperability function produces triplets from the current SSD. When a triplet user roams into an SSD network, the AIF produces SSD from the triplet.

    9.
    发明专利
    未知

    公开(公告)号:DE69916931D1

    公开(公告)日:2004-06-09

    申请号:DE69916931

    申请日:1999-06-08

    Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.

Patent Agency Ranking