Session key generation method, identification card and corresponding device for transmitting data
A technology for session keys and identification cards, which is applied in the field of corresponding devices for generating session keys and identification cards and sending data, and can solve problems such as failure to determine threats
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] figure 1 It shows how, in a first step, at least one access key (BAK) and the sequence value SEQ are transmitted from the service network node DN to the identification card UICC for storage. The access key has an access key identification, which is used later to address the correct access key for the service on the identification card. The communication terminal MS can be a mobile radio terminal, a handset, a mobile computer or a similar communication terminal. The transfer of the value can take place via a secure connection, for example via a specific tunnel. Access keys (BAK-E, BAK-I) are generated in the service network node DN. The access key BAK-I is used for integrity protection and has the same lifetime as the access key BAK-E used for encoding. Alternatively, it is only possible to transmit the access key BAK to the identification card. The access keys BAK-I and BAK-E can then be derived from the access key BAK by means of a suitable encryption function. Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 