Unlock instant, AI-driven research and patent intelligence for your innovation.

Key establishment for constrained resource devices

A constrained and equipment-based technology, applied in the field of key establishment, can solve the problem of inflexible access of trusted users and achieve low-cost effects

Inactive Publication Date: 2016-02-24
TELEFON AB LM ERICSSON (PUBL)
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] However, restricting access to pre-specified trusted users is inflexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key establishment for constrained resource devices
  • Key establishment for constrained resource devices
  • Key establishment for constrained resource devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Hereinafter, various embodiments of the present invention will be described in more detail with reference to the accompanying drawings. For purposes of explanation rather than limitation, specific details such as specific examples and techniques are set forth in order to provide a thorough understanding.

[0033] As mentioned above, restricting access to pre-provisioned trusted users is inflexible, since any client or user would have to be pre-provisioned in the constrained resource device in order for it to be able to access the constrained resource device. This is really a big flaw.

[0034] In order not to be limited to pre-specified trusted clients, a Trusted Third Party (TTP) is introduced in the process of granting access for new clients without re-provisioning constrained resource devices. A TTP representing the owner of the device naturally has a trust relationship with the constrained resource device. This trust relationship can be documented in the form of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It is disclosed a method and a constrained resource device (502, 70, 90) for establishing a secret first key between a client device (506) and the constrained resource device. The invention also relates to a method and an authorization server (504, 60, 80) for enabling establishing a secret first key between a client device (506) and the constrained resource device. Based on a secret second key shared (508) between the constrained RD and the AS, the secret first key shared between the constrained resource device and the client device can be established. Devices having constrained resources cannot use protocols with which additional messages are required to share a secure identity. Embodiments of the present invention have the advantage that a secret identity can be established within an authentication protocol and that no additional messages are required to establish the secret identity.

Description

technical field [0001] This disclosure relates to key establishment for constrained resource devices. In particular, the present disclosure relates to a method and a constrained resource device for establishing a secret key between a client device and a constrained resource device. The present disclosure also relates to a method and an authorization server for enabling the establishment of a secret key between a client device and a constrained resource device. Background technique [0002] The Internet of Things (IoT) is a term commonly used today to refer to the current information technology trend toward a networked society, where anything that would benefit from being connected will be connected using Internet protocols. This means that, unlike the past when mobile phones and computers were primarily connected globally via the Internet, today electronic devices of all kinds are coming online. This trend is expected to accelerate in the following years as hardware and ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W4/00H04W12/00H04L9/40H04L67/12H04W4/70H04W12/0431
CPCH04L63/0435H04L63/062H04L2463/061H04L67/12H04W4/70H04W76/14H04W12/0431H04W12/04H04L9/14H04L9/3247H04L63/0428H04L2209/24H04L2209/72
Inventor 古兰·塞兰德
Owner TELEFON AB LM ERICSSON (PUBL)