Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety transmission method in telecommunication network

A telecommunications network and security technology, applied in security devices, transmission systems, digital transmission systems, etc., to achieve the effect of reducing the number of handshakes, making attacks difficult, and improving security

Inactive Publication Date: 2003-06-04
NOKIA TECHNOLOGLES OY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This leads to the problem that an attacker is able to do a lot of cryptanalysis because the same encryption key is used between the two handshakes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety transmission method in telecommunication network
  • Safety transmission method in telecommunication network
  • Safety transmission method in telecommunication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The invention can be applied to any telecommunication network. In the following, the present invention will be described in detail by taking a mobile station operating in a digital GSM mobile communication system and communicating with applications located inside or outside the GSM network as an example.

[0030] The main embodiment of the present invention will be described in detail below with reference to FIGS. 2 , 3 and 4 .

[0031] Figure 2 shows some examples of the aforementioned connections. The mobile station MS contacting the bank server first performs a handshake according to the prior art, during which the MS and the bank can authenticate each other and exchange required session key information. According to the invention, the mobile station and the bank server negotiate and agree on appropriate intervals for recalculating security parameters for providing confidentiality, data integrity and authentication during communication, eg during a handshake. For e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention related to method for providing connection security for the transmission between communicating parties in a telecommunication network, the method comprising the steps of: exchanging security parameters between communicating parties, providing connection security for messages based on these security parameters, and transmitting said messages between communicating parties. It is characteristic for the method according to the invention that it further comprises the steps of: reaching agreement between communicating parties on an interval for recalculation of the security parameters, monitoring of the interval for recalculation by the communicating parties, recalculating the security parameters at the agreed interval, and providing connection security for messages based on the latest recalculated security parameters.

Description

Technical field: [0001] The invention relates to a method of providing connection security for transmissions between communicating parties of a telecommunication network. Background technique [0002] At the beginning of communication, a handshake is usually performed between telecommunication network applications, during which the parties involved generally authenticate each other and exchange key information, such as negotiating encryption algorithms and encryption keys used in communication. Only after the handshake can the actual data be transferred. The security of the transmission is generally ensured, for example, by encryption. Attached Figure 1a and 1b A block diagram is shown of two known encryption algorithms that can be used to secure transmissions: symmetric algorithms and public-key algorithms. [0003] Figure 1a A symmetric algorithm based on keys shared between participants is shown. On side A on one side, Figure 1a In block E of , the message M to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04W12/00
CPCH04L2209/80H04L9/32H04W12/02H04L9/3242H04W12/06H04W12/10H04W12/033
Inventor 特米·莱维斯特
Owner NOKIA TECHNOLOGLES OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products