Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods and Systems for Bootstrapping an End-to-End Application Layer Session Security Keyset Based on a Subscriber Identity Master Security Credential

a subscriber identity and security credential technology, applied in the field of methods and systems, can solve the problems of insufficient security for many situations, insufficient scale to keep, and insufficient processing

Active Publication Date: 2017-12-21
VERIZON PATENT & LICENSING INC
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach reduces processing and resource usage, enhances security by ensuring end-to-end encryption, and scales effectively with increasing numbers of connected devices, minimizing the risk of fraud and data compromise.

Problems solved by technology

Unfortunately, security protocols that do not extend from end-to-end on an application layer session between a mobile device and an application server may provide insufficient security for many situations (e.g., for fully securing application layer sessions).
Moreover, existing end-to-end application layer session security technologies may involve various aspects (e.g., transferring certificates, authenticating certificates by certificate authorities, managing public and private keys, exchanging multiple messages to derive session keys, etc.) that require inordinate amounts of processing and that will not scale sufficiently to keep up with increasing numbers of client devices that are being connected to provider networks.
As such, security technologies that may have been sufficient in the past may increasingly be found lacking as the future unfolds.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and Systems for Bootstrapping an End-to-End Application Layer Session Security Keyset Based on a Subscriber Identity Master Security Credential
  • Methods and Systems for Bootstrapping an End-to-End Application Layer Session Security Keyset Based on a Subscriber Identity Master Security Credential
  • Methods and Systems for Bootstrapping an End-to-End Application Layer Session Security Keyset Based on a Subscriber Identity Master Security Credential

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012]Methods and systems for bootstrapping an end-to-end application layer session security keyset based on a subscriber identity master security credential are described herein. An application layer session may include any communication session between two computing devices (e.g., a client device and an application server system) that involves exchanging data between respective software modules (e.g., software applications) running on the computing devices. For example, the application layer session may involve communications that are associated with the application layer (i.e., Layer 7) of the Open Systems Interconnection model of networking (“the OSI model”) and that are exchanged (e.g., over a provider network) between software applications running on respective computing devices. In some examples, application layer sessions may refer, in whole or in part, to communications (e.g., packets, messages, data sequences, connections, etc.) and / or communication sessions that are assoc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An exemplary security key bootstrapping system determines an application layer session security keyset uniquely associated with a client device and based on a subscriber identity master security credential. The subscriber identity master security credential is permanently stored within a component of the client device and is also stored on a subscriber identity management server associated with a provider network by which the client device is communicatively coupled with an application server system. The security key bootstrapping system uses the application layer session security keyset as a credential to provide end-to-end security for an application layer session between the client device and the application server system over the provider network. Neither the component of the client device nor the subscriber identity management server obtains the subscriber identity master security credential from an exchange of the subscriber identity master security credential over the provider network.

Description

BACKGROUND INFORMATION[0001]Wireless communication network technologies continue to advance. For example, wireless communication service providers such as mobile phone service providers are deploying and expanding provider networks (e.g., Long Term Evolution (“LTE”) wireless communication networks) that are configured to provide not only voice services, but also data services whereby various computing devices connected to the provider networks (e.g., client devices, application servers, etc.) may exchange data over the provider networks. Thus, along with supporting voice calls between cell phones and / or other telephonic devices, provider networks may also support the exchange of data between various types of client devices (e.g., cell phones, tablet computers, Internet of Things (“IoT”) devices, etc.) and application servers to allow the client devices, for example, to access data services provided by the application servers, to report data or receive updates from the application se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08H04W12/04H04W8/18H04W12/06H04L29/06
CPCH04L9/0847H04W12/06H04L63/168H04W8/183H04W12/04H04L9/0844H04L2209/80H04W12/72H04W12/0431
Inventor BERZIN, OLEGZHANG, YUEPINGVENKATARAMU, PRAVEEN
Owner VERIZON PATENT & LICENSING INC