Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatuses for ensuring secure attachment in size constrained authentication protocols

A technology of protocol and certificate, applied in the fields of mobile devices and servers implementing the method

Pending Publication Date: 2021-08-06
THALES DIS FRANCE SA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, no mechanism exists that provides a good level of security including data privacy, integrity, and authenticity while cooperating with the data size constraints of protocols like Easy Connect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatuses for ensuring secure attachment in size constrained authentication protocols
  • Method and apparatuses for ensuring secure attachment in size constrained authentication protocols
  • Method and apparatuses for ensuring secure attachment in size constrained authentication protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] For a more complete understanding of the invention, the invention will now be described in detail with reference to the accompanying drawings. The detailed description will illustrate and describe what are considered to be the preferred embodiments of the invention. It will of course be understood that various modifications and changes in form or detail could readily be made without departing from the spirit of the invention. It is therefore intended that the invention may not be limited to the exact form and details shown and described herein, nor to any less than the entire invention herein disclosed and hereinafter claimed. In different drawings, the same elements are designated with the same reference signs. For the sake of clarity, only those elements and steps that are useful for understanding the invention are shown in the drawings and will be described.

[0077] figure 1 A flowchart is schematically shown of the exchange over the network NW between the creden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method to securely attach a mobile device (MD) having a credential container (CC) to a server (SV) while using a protocol having data size encoding constraints which prevents from using traditional ciphering, said method comprising an initialization phase using a same range of ephemeral IMSIs (RG1(IMSI)) stored in a batch of credential containers (CC) of mobile devices (MD) and an associated group master key (MK11) shared by the server (SV) and the batch of credential containers (CC) of mobile devices (MD) having the same range of ephemeral IMSIs (RG1(IMSI)) to initiate the secured session further using a server random value (Rnd), said initialization phase using limited payload in a first mobile device (MD) to server (SV) message (ATTR (rIMSI)_1) to send a randomly chosen rIMSI among the range of IMSIs (RG1(IMSI)) to enable the server (SV) to generate keys to initiate a secured communication phase then using individual keys (SK12c, SK12i) stored in the credential container (CC) of the mobile device (MD) and retrieved by the server (SV) with an identifier of the credential container (CCId) also sent using limited payload in a mobile device (MD) to server (SV) message (AUTF (rIMSI, AUTS)_3) and with an individualization master key (MK12) owned by the server (SV).

Description

technical field [0001] The present invention relates to a method of securely attaching a mobile device with a credential container to a server, while using a protocol with data size encoding constraints that prevents the use of legacy encryption, such constraints including at least: [0002] - constraints related to the number of data payloads in each exchange, especially in the mobile-to-server direction, [0003] - constraints related to the asymmetry of the data payload size in the server-to-mobile direction and in the mobile-to-server direction, and [0004] - Constraints related to the impossibility of encrypting some data in the data payload. [0005] The invention also relates to a mobile device and a server implementing the method. [0006] The invention concerns any consumer and M2M device with cellular access for any relevant telecommunication services: 2G, 3G, 4G / LTE, NB-IOT, and possibly 5G radio networks. It concerns devices using UICC or eUICC (embedded) or iU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/69H04W12/06
CPCH04W12/02H04W12/06H04W12/42H04W12/35H04W12/106H04W12/068H04W12/03H04W12/041
Inventor M·兰伯顿E·布雷塔尼A·古热S·莫兰迪A·施瓦茨
Owner THALES DIS FRANCE SA