Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus for providing secure transmissions in a wireless communication system. SOLUTION: Transmission traffic is encrypted at separate protocol layers L1 (220), L2 (210) and L3 (200), separate encryption elements 204a-204e are assigned to separate types of transmission traffic 201, 203 and 205, and different levels of encryption are performed according to service requirements. Encryption elements 204a-204e use variable value inputs, called encryption synchronization, along with semi-permanent encryption keys to protect from replay attacks by mobile stations performing fraud. Encryption synchronization values vary, so that a method for synchronizing encryption synchronization at a mobile station and base station is also provided. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
Abstract:
Un procedimiento para transmitir variables de autenticación desde un extremo de transmisión hasta un extremo de recepción, que comprende generar un valor de cripto-sincronización en el extremo de transmisión; generar una primera firma de autenticación a partir del valor de cripto-sincronización y una clave de encriptación en el extremo de transmisión; caracterizado porque el procedimiento comprende: transmitir el valor de cripto-sincronización y la primera firma de autenticación al extremo de recepción; generar una segunda firma de autenticación a partir del valor de cripto-sincronización y la clave de encriptación en el extremo de recepción; incrementar el valor de cripto-sincronización en el extremo de recepción si la primera firma de autenticación y la segunda firma de autenticación coinciden; y solicitar un intercambio de claves de encriptación si la primera firma de autenticación y la segunda firma de autenticación no coinciden.
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
Abstract:
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.