Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for securing connections in a communication network

A technology for user equipment and equipment, which is applied in wireless communication, security communication devices, security devices, etc., and can solve problems such as undesired, slowing down the authentication process, and time-consuming users.

Active Publication Date: 2018-07-10
TELEFON AB LM ERICSSON (PUBL)
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Previous attempts to authenticate both the user and the device have the disadvantage that they require disclosure of the user's secret to the BSF (or some other server controlled by the mobile network operator), which is clearly inappropriate if one wishes to prevent the network operator from being able to access communications. needs
[0015] These problems can be mitigated by using secondary authorization protocols in secure connections established by GBA; however, the additional signaling required can slow down the authentication process, making it more time-consuming for the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for securing connections in a communication network
  • Method and device for securing connections in a communication network
  • Method and device for securing connections in a communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The Generic Bootstrapping Architecture (GBA) defined in 3GPP Technical Specification TS 33.220 provides a mechanism whereby a client terminal (UE) can be authenticated to a network application function (NAF) and a secure session key can be derived for communication between the UE and the NAF use. like figure 2 As shown, the GBA provides a mechanism whereby the UE bootstraps with the Bootstrap Server Function (BSF) such that the UE is authenticated to the BSF and a master key Ks and a Bootstrap Transaction Identifier (B-TID) are obtained. The UE then derives the application specific key Ks_NAF through a Key Derivation Function (KDF) defined as KDF(Ks, "gba-me", nonce, IMPI, NAF_id). Ks is the previously defined master key; "gba-me" is a fixed value; nonce is a random number used to generate Ks; IMPI is the Internet Protocol Multimedia Private Identity of the UE; and NAF_id is the NAF identifier of the NAF. The NAF_ID is formed by concatenating the Fully Qualified Doma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method and Apparatus for Securing a Connection in a Communications Network A method of operating a user equipment (UE) using a Generic Bootstrapping Architecture (GBA) is provided. The method includes establishing a shared secret between the UE and a Network Application Function (NAF). An authentication request is sent to a Bootstrapping Server Function (BSF) by the UE. An original parameter intended for a key derivation function and a bootstrapping transaction identifier is received from the BSF. An application request, including the bootstrapping transaction identifier, is sent by the UE to the NAF. A modified parameter is derived by the UE from the secret and the original parameter intended for the key derivation function. A cryptographic key is determined using said modified parameter in place of or in addition to the original parameter in the key derivation function, and communications with the NAF are secured using the key.

Description

technical field [0001] The invention relates to methods and devices for securing connections in a communication network. More specifically, though not necessarily, the present invention relates to two-factor authentication for use in a generic bootstrap architecture. Background technique [0002] Today we see the development towards the network society. An increasing percentage of users' daily lives are spent using telecommunication services such as telephone calls, instant messaging, email, or access to Internet services. Even users' personal data such as documents, music, photos, etc. are stored on web services "in the cloud". Social networking provides communication, online presence and document sharing. Public and private sector companies rely on telecom and cloud services to increase their business volumes. Consequently, the importance of security and privacy for users and businesses continues to increase. Particularly important aspects are authentication and data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/04
CPCH04W12/04H04W12/06H04W12/0431H04B1/3816H04L9/0894H04L9/3236
Inventor M.A.小辛普利西奥T.C.卡瓦尔霍C.多米尼西尼P.哈坎森L.H.伊瓦亚M.纳斯伦
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products