Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers

A computer program and equipment technology, applied in the field of computer program products, can solve problems such as inability to derive encryption keys, lack of encryption key separation security, etc.

Active Publication Date: 2011-03-02
NOKIA TECH OY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the eNodeB that previously served the mobile terminal may know or be able to calculate the encryption key currently used by the mobile terminal and its serving eNodeB, and decrypt the data transmitted between the mobile terminal and the current serving eNodeB, thus Resulting in a lack of cryptographic key separation security
[0005] Therefore, it is desirable to develop a handover protocol that can provide cryptographic key separation security such that the previous eNodeB cannot derive the encryption keys used by the mobile terminal and the current eNodeB

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers
  • Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers
  • Methods, apparatuses, and computer program products for providing multi-hop cryptographic separation for handovers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the present invention will now be described more fully with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.

[0024] figure 1A block diagram of a mobile terminal 10 that would benefit from embodiments of the present invention is shown. It should be understood, however, that the mobile telephone shown and hereinafter described is merely exemplary of one type of mobile terminal that would benefit from embodiments of the present invention and, therefore, should not be taken to limit the scope of embodiments of the present invention. Although one embodiment of a mobile terminal 10 is shown and hereina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, apparatus and computer program product are provided to provide cryptographical key separation for handovers. A method is provided which includes calculating a key based at least in part upon a previously stored first intermediary value. The method also includes calculating a second intermediary value based at least in part upon the calculated key. The method additionally includes sending a path switch acknowledgement including the second intermediary value to a target access point. The method may further include receiving a path switch message including an indication of a cell identification and calculating the encryption key based upon the indication of the cell identification. The method may further include storing the second intermediary value. The calculation of the key may further comprise calculating the key following a radio link handover. Corresponding apparatuses and computer program products are also provided.

Description

technical field [0001] Embodiments of the present invention relate generally to wireless communication technologies, and more particularly to apparatus, methods and computer program products for providing cryptographic key separation after handover. Background technique [0002] Current and future networking technologies continue to facilitate ease of information transfer and user convenience. In order to provide simpler or faster information transmission and convenience, service providers in the telecommunications industry are improving existing networks. For example, the Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (E-UTRAN) is currently being developed. Also known as Long Term Evolution (LTE) or 3.9G, E-UTRAN aims to update existing technologies by improving efficiency, reducing costs, improving services, taking advantage of new spectrum opportunities, and providing better integration with other open standards. [0003] One ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L29/06
CPCH04L2463/061H04L63/062H04L9/0866H04L9/083H04W12/04H04L2209/80H04W36/08H04W12/041
Inventor D·L·A·弗斯伯格P·V·涅米M·布罗梅尔特
Owner NOKIA TECH OY