Secure session key generation

A session key and security technology, which is applied in the direction of public key for secure communication, security device, encryption device with shift register/memory, etc.

Inactive Publication Date: 2011-04-27
INTERDIGITAL PATENT HLDG INC
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Securely shared session keys are generated usin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure session key generation
  • Secure session key generation
  • Secure session key generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0082] 1. A method for securing communication between a Universal Integrated Circuit Card (UICC) and a terminal.

[0083] 2. A method as in any one of the preceding embodiments, wherein securing the communication comprises generating a secure shared session key.

[0084] 3. The method as in any one of the preceding embodiments, wherein securing communications comprises using the secure shared session key to encrypt communications between the UICC and the terminal.

[0085] 4. The method as in any one of the preceding embodiments, wherein generating the secure shared session key comprises deriving the secure shared session key from a shared ciphertext.

[0086] 5. The method as in any one of the preceding embodiments, wherein deriving the secure shared session key from the shared secret comprises generating a session secret from the secret.

[0087] 6. The method as in any one of the preceding embodiments, wherein deriving the secure shared session key comprises performing a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key Agreement (AKA) and application level generic bootstrapping architecture (GBA) with UICC-based enhancements (GBA_U) procedures is improved. A secure shared session key is used to encrypt communications between the UICC and the Terminal. The secure shared session key generated using authenticating or non-authenticating procedures.

Description

technical field [0001] This application relates to wireless communication Background technique [0002] Authentication and Key Agreement (AKA) procedures are used to establish authentication and shared security keys for Wireless Transmit / Receive Units (WTRUs) in 3rd Generation Partnership Project (3GPP) communication networks. AKA provides secure mutual authentication between two parties. In addition, the UICC-enhanced application layer Generic Bootstrap Architecture (GBA) (GBA_U) based on the AKA program provides a way to enable application security. However, the AKA and UICC-enhanced application-level Generic Bootstrap Architecture (GBA) (GBA_U) procedures based on UICC do not secure the interface connecting the WTRU's Universal Integrated Circuit Card (UICC) and the terminal. During the AKA and GBA_U procedures, key key related material is passed from the UICC to the terminal. Thus, session keys (eg CK / IK and Ks_ext_NAF) are exposed during initialization provision for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/061H04L63/0428H04W88/02H04W12/02H04W12/0431H04W12/40H04L9/06H04L9/30H04L9/32
Inventor L·J·古乔内Y·多迪斯Y·C·沙阿I·查
Owner INTERDIGITAL PATENT HLDG INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products