Unlock instant, AI-driven research and patent intelligence for your innovation.

Session key generation method, identification card and corresponding device for transmitting data

A technology for session keys and identification cards, which is applied in the field of corresponding devices for generating session keys and identification cards and sending data, and can solve problems such as failure to determine threats

Active Publication Date: 2010-12-15
SIEMENS AG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This may be due to the failure to identify the assumed threat here

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session key generation method, identification card and corresponding device for transmitting data
  • Session key generation method, identification card and corresponding device for transmitting data
  • Session key generation method, identification card and corresponding device for transmitting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] figure 1 It shows how, in a first step, at least one access key (BAK) and the sequence value SEQ are transmitted from the service network node DN to the identification card UICC for storage. The access key has an access key identification, which is used later to address the correct access key for the service on the identification card. The communication terminal MS can be a mobile radio terminal, a handset, a mobile computer or a similar communication terminal. The transfer of the value can take place via a secure connection, for example via a specific tunnel. Access keys (BAK-E, BAK-I) are generated in the service network node DN. The access key BAK-I is used for integrity protection and has the same lifetime as the access key BAK-E used for encoding. Alternatively, it is only possible to transmit the access key BAK to the identification card. The access keys BAK-I and BAK-E can then be derived from the access key BAK by means of a suitable encryption function. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a session key generation method, an identification card and a corresponding device for transmitting data. According to the invention, in the identification card of communication terminal equipment, at least one access key transmitted by a service network node and at least one transmitted sequence value are stored. The effective value is calculated in the service network node. Furthermore the effective value, the service data and other sequence value are transmitted to the communication terminal equipment together. When the data are received, the effective value is compared with the effective value calculated in the identification card. Furthermore in the identification card, other sequence value transmitted together with the data is compared with the sequence value stored on the identification card. Furthermore only when a positive comparing result that only two effective values and two sequence values exist is provided, the session key which is generated by the identification card for decoding the service data is forwarded to a terminal of the communication terminal equipment.

Description

[0001] The present invention is an invention patent application with the application number 200480039818.9, the application date is 2004.10.29, and the invention title is "Authentication and Reality of Session Key Generation between Service Network Nodes and At least One Communication Terminal Equipment with Identification Card" divisional application. technical field [0002] The invention relates to a method and a device for checking whether service data transmitted from a service network node via a communication network to a communication terminal originate from a trustworthy source. Background technique [0003] Document D1 (MBMS Security Rapporteur: "Latest Version of MBMS TS (33.246v0.2.1)" (3GPP TSG SA WG3 Security-S3, 30, [Online] October 10, 2003 (2003-10-10, XP002315613 Povoa De Varzim, Portugal) describes the security procedures for the Multimedia Broadcast / Multicast Service (MBMS) of the 3GPP systems (UTRAN and GERAN). MBMS is A service which is provided via the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L29/06H04L9/08H04L9/32H04W12/06
CPCH04L2209/80H04L63/0853H04W12/04H04W12/10H04L9/3242H04L9/3234H04L9/0891H04L2463/061H04L63/126H04W4/06H04W12/041
Inventor M·布洛梅尔特
Owner SIEMENS AG