Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for securing network communications

A technology of secure channel and secure communication, applied in wireless communication, transmission system, security device, etc., can solve the problems that communication is not fully protected, communication is not properly guaranteed, network communication is vulnerable to attack, etc.

Inactive Publication Date: 2013-12-18
INTERDIGITAL PATENT HLDG INC
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In one embodiment, the network communication is vulnerable because the communication is not adequately secured and / or the communication is sent without proper assurance that the network entity to which the communication is being sent is authentic or expected network entity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for securing network communications
  • Systems and methods for securing network communications
  • Systems and methods for securing network communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The system, method and apparatus embodiments disclosed herein are used, for example, for secure communications between network entities such as users / user equipment (UE), service providers and / or identity providers. As described herein, secure communications may occur via secure channels between network entities established using inter-entity shared keys / secrets or using public / private keys. These secure channels can be used to thwart third-party attacks, eg from eg man-in-the-middle (MitM) attacks.

[0029] In the embodiments described herein, secure communications may occur using a shared key or shared secret to identify the intended, authenticated entity for sending and / or receiving communications. For example a shared key or shared secret may be used to encrypt or sign messages sent between network entities in a manner indicative of the authenticity of the network entities.

[0030] In example embodiments, the secure communications described herein may be based on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Secure communications may be established amongst network entities for performing authentication and / or verification of the network entities. For example, a user equipment (UE) may establish a secure channel with an identity provider, capable of issuing user identities for authentication of the user / UE. The UE may also establish a secure channel with a service provider, capable of providing services to the UE via a network. The identity provider may even establish a secure channel with the service provider for performing secure communications. The establishment of each of these secure channels may enable each network entity to authenticate to the other network entities. The secure channels may also enable the UE to verify that the service provider with which it has established the secure channel is an intended service provider for accessing services.

Description

[0001] Cross References to Related Applications [0002] This application claims U.S. Provisional Patent Application No. 61 / 466,662, filed March 23, 2011, U.S. Provisional Patent Application No. 61 / 525,575, filed August 19, 2011, and U.S. Provisional Patent Application No. 61 / 525,575, filed March 23, 2011 Benefit of Application No. 61 / 466,852, which is hereby incorporated by reference in its entirety. Background technique [0003] In a communication network, various forms of communication between network entities may be vulnerable to attacks by third parties. For example, according to one embodiment, a user device may attempt to access a service (eg, a website) from a service provider via a communication network, and this access attempt and / or other communications from the user device may be intercepted by a third party or a man-in-the-middle (MitM). For example, this third party may act as an intended service provider to gain access to information associated with the user de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/0272H04L63/0869H04L63/168H04W12/06H04L67/02H04W12/02H04L9/3271G06F21/53G06F21/575G06F2221/2107G06F2221/2149G06F21/42G06F21/335H04W12/0431H04L67/01H04L9/0819H04L63/062
Inventor I·查L·J·古乔内A·施米特A·莱切尔Y·C·沙阿
Owner INTERDIGITAL PATENT HLDG INC