Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for key management for wireless communications systems

A master key and temporary key technology, applied in the field of key management systems for low-latency network access, can solve the problems of insecure master keys, security risks, and endangering communication security.

Active Publication Date: 2009-08-12
QUALCOMM INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if one access point is compromised, this approach poses a serious security risk because the master key becomes insecure and can be used to compromise all communications using that master key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for key management for wireless communications systems
  • Systems and methods for key management for wireless communications systems
  • Systems and methods for key management for wireless communications systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In the following description specific details are given to provide a thorough understanding of the embodiments. However, one of ordinary skill in the art will understand that the embodiments may be practiced without these details. For example, circuits may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, structures and techniques have been shown in detail in order not to obscure the embodiments.

[0062] Furthermore, it is noted that embodiments may be described as processes, shown as flowcharts, process views, block diagrams, or block diagrams. While a flowchart can describe operations as a sequential process, many operations can be performed in parallel or simultaneously. In addition, the order of operations can be rearranged. A process ends when its operations are complete. A procedure may correspond to a method, function, step, subroutine, subroutine, or the like. When a procedure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A novel key management approach is provided for securing communication handoffs between and access terminal and two access points. This approach provides for securely handing off communications between an access terminal and access point without risking exposure a master key for the access terminal. Temporary master keys are derived for low latency handoffs and secure authentication between a new access point and the access terminal. In one aspect, a distributive key management scheme is provided in which a current access point generates a new security key (based on its own security key) that is used by the next access point with which an access terminal communicates. In another aspect, a centralized key management scheme is provided in which a central authenticator maintains, generates, and distributes new security keys (based on a master security key associated with the access terminal) to access points.

Description

[0001] Priority claim based on 35 U.S.C. §119 [0002] This patent application claims priority to Provisional Application No. 60 / 840141, filed August 24, 2006, entitled "Systems and Methods for Key Management for Wireless Communication Systems," which is assigned to the assignee of this application , which is expressly incorporated herein by reference. technical field [0003] Various features relate to wireless communication systems. At least one aspect relates to key management systems and methods for low latency network access. Background technique [0004] Wireless communication networks enable communication devices to send and / or receive information while moving. These wireless communication networks can be communicatively coupled to other public or private networks to enable the transfer of information to and the reception of information from the mobile access terminals. Such communication networks typically include a plurality of access points (eg, base stations) t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04H04W36/00
CPCH04L2209/80H04W12/04H04L63/062H04W36/08H04L9/0844H04L9/08H04L9/0891H04L2463/061H04W12/041H04W12/0433H04W12/0431
Inventor V·纳拉亚南L·R·东代蒂P·A·阿加什P·E·本德
Owner QUALCOMM INC