Secure session key generation

A session key and security technology, which is applied in the direction of public key for secure communication, security device, encryption device with shift register/memory, etc.

Inactive Publication Date: 2011-04-27
INTERDIGITAL PATENT HLDG INC
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Securely shared session keys are generated using authenticated or non-authenticated procedures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure session key generation
  • Secure session key generation
  • Secure session key generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0082] 1. A method for securing communication between a Universal Integrated Circuit Card (UICC) and a terminal.

[0083] 2. A method as in any one of the preceding embodiments, wherein securing the communication comprises generating a secure shared session key.

[0084] 3. The method as in any one of the preceding embodiments, wherein securing communications comprises using the secure shared session key to encrypt communications between the UICC and the terminal.

[0085] 4. The method as in any one of the preceding embodiments, wherein generating the secure shared session key comprises deriving the secure shared session key from a shared ciphertext.

[0086] 5. The method as in any one of the preceding embodiments, wherein deriving the secure shared session key from the shared secret comprises generating a session secret from the secret.

[0087] 6. The method as in any one of the preceding embodiments, wherein deriving the secure shared session key comprises performing a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key Agreement (AKA) and application level generic bootstrapping architecture (GBA) with UICC-based enhancements (GBA_U) procedures is improved. A secure shared session key is used to encrypt communications between the UICC and the Terminal. The secure shared session key generated using authenticating or non-authenticating procedures.

Description

technical field [0001] This application relates to wireless communication Background technique [0002] Authentication and Key Agreement (AKA) procedures are used to establish authentication and shared security keys for Wireless Transmit / Receive Units (WTRUs) in 3rd Generation Partnership Project (3GPP) communication networks. AKA provides secure mutual authentication between two parties. In addition, the UICC-enhanced application layer Generic Bootstrap Architecture (GBA) (GBA_U) based on the AKA program provides a way to enable application security. However, the AKA and UICC-enhanced application-level Generic Bootstrap Architecture (GBA) (GBA_U) procedures based on UICC do not secure the interface connecting the WTRU's Universal Integrated Circuit Card (UICC) and the terminal. During the AKA and GBA_U procedures, key key related material is passed from the UICC to the terminal. Thus, session keys (eg CK / IK and Ks_ext_NAF) are exposed during initialization provision for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/061H04L63/0428H04W88/02H04W12/02H04W12/0431H04W12/40H04L9/06H04L9/30H04L9/32
Inventor L·J·古乔内Y·多迪斯Y·C·沙阿I·查
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products