Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for authenticating alert messages in a network

A device and message technology, used in network data management, emergency/dangerous communication services, security devices, etc.

Active Publication Date: 2016-11-02
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, since the signature field is already included in the PWS alert message, the problems described in the previous paragraphs with existing proprietary schemes and incorrect implementations will become a reality once the signature scheme is added to the 3GPP release

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authenticating alert messages in a network
  • Method and apparatus for authenticating alert messages in a network
  • Method and apparatus for authenticating alert messages in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Although the above methods cover various modifications and alternative implementations (for example, in user equipment (UE) forms of transmitting and receiving devices, computer programs, and computer program products including computer programs), they are shown in the accompanying drawings Examples are described and will be described in detail below. However, it will be understood that the detailed description and drawings are not intended to limit the general inventive idea to the specific form disclosed.

[0053] In general, it is described that the receiver of the message (for example, UE / mobile terminal) can display the message without using the received authentication information associated with the message to verify the authenticity of the message when the receiver is in a specific configuration. A system for messaging (or sending some other form of notification to the user). After the receiver obtains the new configuration from the configuration function, the rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification device for providing a notification to a user, and a control unit for controlling the operation of the communications unit and notification unit. The communications unit is configured to receive an information message (110, 112, 115), and to receive security authentication data (110, 112, 115) associated with the information message if such security authentication data is available. The control unit is configured to operate in a first or second configuration. In the first configuration it ignores the security authentication data, (111, 113), and instructs the notification unit to convey the notification to the user. In the second configuration, it verifies the information message (116) on the basis of the security authentication data and instructs the notification unit to convey the notification to the user if the verification is successful. The communications unit is configured to receive a configuration message (114) indicating the configuration in which the control unit should operate, and the control unit is configured to change configuration if the indicated configuration is different to the current configuration.

Description

Technical field [0001] The present invention relates to a method and device for authenticating alarm messages in a network. Specifically, the present invention relates to a method for configuring an authentication system. Background technique [0002] There are known techniques for broadcasting messages to users in a cellular network and providing credibility and integrity protection for these messages. The combination of integrity protection and authentication will be referred to as authentication or message authentication in the following. Examples of these systems include Multicast Broadcast and Multimedia System (MBMS) (TS33.246), Cell Broadcast System (CBS) (TS23.041v11.0.0 and TS23.401v10.4.0) specified by 3GPP, and their security is currently being specified Public Alert System (PWS) ( http : / / www.3ggDD.orgg / ftp / tsgg sa / WG3Securitv / TSGS363Chenedu / Docs / S3-110565.zip ). [0003] In the broadcast setting, origin authentication is necessary. This is usually achieved by add...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W8/24H04W4/90
CPCH04L63/08H04L63/123H04W4/90H04W12/106
Inventor 莫尼卡·威弗森米凯尔·利延斯坦约翰·马特森卡尔·诺曼
Owner TELEFON AB LM ERICSSON (PUBL)