Method and apparatus for securing a connection in a communications network

A device and network technology, applied in the field of two-factor authentication, can solve problems such as undesirable, slow down the authentication process, and time-consuming for users

Active Publication Date: 2015-07-01
TELEFON AB LM ERICSSON (PUBL)
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Previous attempts to authenticate both the user and the device have the disadvantage that they require disclosure of the user's secret to the BSF (or some other server controlled by the mobile network operator), which is clearly inappropriate if one wishes to prevent the network operator from being able to access communications. needs
[0015] These problems can be mitigated by using secondary authorization protocols in secure connections established by GBA; however, the additional signaling required can slow down the authentication process, making it more time-consuming for the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for securing a connection in a communications network
  • Method and apparatus for securing a connection in a communications network
  • Method and apparatus for securing a connection in a communications network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The Generic Bootstrapping Architecture (GBA) defined in 3GPP Technical Specification TS 33.220 provides a mechanism whereby a client terminal (UE) can be authenticated to a network application function (NAF) and a secure session key can be derived for communication between the UE and the NAF use. Such as figure 2 As shown, the GBA provides a mechanism whereby the UE bootstraps with the Bootstrap Server Function (BSF) such that the UE is authenticated to the BSF and a master key Ks and a Bootstrap Transaction Identifier (B-TID) are obtained. The UE then derives the application specific key Ks_NAF through a Key Derivation Function (KDF) defined as KDF(Ks, "gba-me", nonce, IMPI, NAF_id). Ks is the previously defined master key; "gba-me" is a fixed value; nonce is a random number used to generate Ks; IMPI is the Internet Protocol Multimedia Private Identity of the UE; and NAF_id is the NAF identifier of the NAF. The NAF_ID is formed by concatenating the Fully Qualified D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of securing a session between a Network Application Function, NAF, and a User Equipment, UE, connected to a network. The NAF is assigned a NAF identifier, NAF_id, using the Generic Bootstrapping Architecture, GBA, or a similar architecture and a shared secret is established between the UE and the NAF (S7.1). An application request containing a bootstrapping transaction identifier is sent to the NAF from the UE (S7.2) and an authentication request comprising the bootstrapping transaction identifier, the NAF_id, and information derived from the shared secret is sent to a Bootstrapping Server Function, BSF, from the NAF (S7.4).The BSF and the UE determine a NAF key, Ks_NAF, by using a modified parameter in place of or in addition to an original parameter in a key derivation function, the modified parameter being derived from the shared secret and the original parameter of the key derivation function (S7.5). This NAF key is transmitted from the BSF to the NAF (S7.6) and used to secure communications between the NAF and the UE (S7.7). Also provided are apparatus to act as a NAF, UE, and BSF in the method above.

Description

technical field [0001] The invention relates to methods and devices for securing connections in a communication network. More specifically, though not necessarily, the present invention relates to two-factor authentication for use in a generic bootstrap architecture. Background technique [0002] Today we see the development towards the network society. An increasing percentage of users' daily lives are spent using telecommunication services such as telephone calls, instant messaging, email, or access to Internet services. Even users' personal data such as documents, music, photos, etc. are stored on web services "in the cloud". Social networking provides communication, online presence and document sharing. Public and private sector companies rely on telecom and cloud services to increase their business volumes. Consequently, the importance of security and privacy for users and businesses continues to increase. Particularly important aspects are authentication and data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/04
CPCH04W12/06H04W12/04H04W12/0431H04B1/3816H04L9/0894H04L9/3236
Inventor M.A.小辛普利西奥T.C.卡瓦尔霍C.多米尼西尼P.哈坎森L.H.伊瓦亚M.纳斯伦
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products