Prevention of eavesdropping type of attack in hybrid communication system
    31.
    发明授权
    Prevention of eavesdropping type of attack in hybrid communication system 有权
    在混合通信系统中预防窃听类型的攻击

    公开(公告)号:US08897751B2

    公开(公告)日:2014-11-25

    申请号:US13047256

    申请日:2011-03-14

    IPC分类号: H04M1/68 H04L29/06 H04W12/06

    摘要: Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a hybrid communication system wherein at least one computing device is configured to selectively operate in a first communication mode or a second communication mode, preventing the at least one computing device from completing an attachment process in the first communication mode when it is determined that authentication data being used to authenticate the at least one computing device in the first communication mode was generated for an authentication process in the second communication mode.

    摘要翻译: 公开了用于在包括混合通信系统的环境中保护通信的技术。 例如,一种方法包括在混合通信系统中,其中至少一个计算设备被配置为选择性地以第一通信模式或第二通信模式操作,防止所述至少一个计算设备完成第一通信中的附着过程 当在第二通信模式中确定用于认证在第一通信模式中的至少一个计算设备的认证数据被生成用于认证处理时的模式。

    Management of public keys for verification of public warning messages
    32.
    发明授权
    Management of public keys for verification of public warning messages 有权
    管理公钥用于核查公共警告信息

    公开(公告)号:US08838971B2

    公开(公告)日:2014-09-16

    申请号:US13351058

    申请日:2012-01-16

    IPC分类号: H04L9/32 H04L9/30 H04W4/22

    摘要: Techniques are disclosed for managing one or more public keys used for verification of one or more messages transferred over a communication network associated with a public warning system. In one example, a method comprises the following steps. A computing device of a communication network obtains key material for at least one source of a message generated for a public warning system. The computing device also obtains an identity of the source. A public key is computed by the computing device from the key material and the identity of the source. The public key is thus useable by the computing device to verify a message received from the source that is digitally signed using a corresponding private key of the source. In one example, the computing device comprises user equipment.

    摘要翻译: 公开了用于管理用于验证通过与公共警告系统相关联的通信网络传送的一个或多个消息的一个或多个公钥的技术。 在一个示例中,一种方法包括以下步骤。 通信网络的计算设备获得用于为公共警报系统生成的消息的至少一个源的密钥材料。 计算设备还获得源的身份。 公钥由计算设备从密钥材料和源的身份计算。 因此,公用密钥可由计算设备使用,以使用源的相应私钥来验证从源接收到的数字签名的消息。 在一个示例中,计算设备包括用户设备。

    Method and apparatus for communication between wireless telecommunications networks of different technology types
    33.
    发明授权
    Method and apparatus for communication between wireless telecommunications networks of different technology types 有权
    用于不同技术类型的无线电信网络之间通信的方法和装置

    公开(公告)号:US08804662B2

    公开(公告)日:2014-08-12

    申请号:US12935852

    申请日:2009-03-13

    IPC分类号: H04W4/00

    摘要: For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node 4 included in a network of a first technology type and a second node 10 included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.

    摘要翻译: 对于不同技术类型的无线电信网络之间的切换,在包括在第一技术类型的网络中的第一节点4和第二不同技术类型的网络中包括的第二节点10之间建立空中接口。 根据第二技术类型的信令消息传送涉及移动终端从第一技术类型的网络到第二技术类型的网络的切换。 信令消息被封装在容器中,用于通过信令接口进行传输。 标识符与容器相关联,以指示其封装信令消息。 当在第一节点处检测到标识符时,容器通过接口发送到第二节点。 在根据本发明的一种方法中,第一种技术类型是WiMAX,标识符是特殊业务流标识符。 例如,这可以在接入服务网络网关(ASN GW)处检测。 因此,根据本发明的方法允许使用逻辑无线电信道来封装技术间信令。

    MANAGEMENT OF PUBLIC KEYS FOR VERIFICATION OF PUBLIC WARNING MESSAGES
    34.
    发明申请
    MANAGEMENT OF PUBLIC KEYS FOR VERIFICATION OF PUBLIC WARNING MESSAGES 有权
    公众对公共警告信息进行验证的管理

    公开(公告)号:US20130185561A1

    公开(公告)日:2013-07-18

    申请号:US13351058

    申请日:2012-01-16

    IPC分类号: H04L9/32

    摘要: Techniques are disclosed for managing one or more public keys used for verification of one or more messages transferred over a communication network associated with a public warning system. In one example, a method comprises the following steps. A computing device of a communication network obtains key material for at least one source of a message generated for a public warning system. The computing device also obtains an identity of the source. A public key is computed by the computing device from the key material and the identity of the source. The public key is thus useable by the computing device to verify a message received from the source that is digitally signed using a corresponding private key of the source. In one example, the computing device comprises user equipment.

    摘要翻译: 公开了用于管理用于验证通过与公共警告系统相关联的通信网络传送的一个或多个消息的一个或多个公钥的技术。 在一个示例中,一种方法包括以下步骤。 通信网络的计算设备获得用于为公共警报系统生成的消息的至少一个源的密钥材料。 计算设备还获得源的身份。 公钥由计算设备从密钥材料和源的身份计算。 因此,公用密钥可由计算设备使用,以使用源的相应私钥来验证从源接收到的数字签名的消息。 在一个示例中,计算设备包括用户设备。

    Verification Of Content Possession By An Announcing Peer In A Peer-To-Peer Content Distribution System
    35.
    发明申请
    Verification Of Content Possession By An Announcing Peer In A Peer-To-Peer Content Distribution System 有权
    通过在对等内容分发系统中宣布对等体验证内容拥有

    公开(公告)号:US20130104247A1

    公开(公告)日:2013-04-25

    申请号:US13344826

    申请日:2012-01-06

    IPC分类号: G06F21/24 G06F15/16

    摘要: A tracker node verifies content possession by a peer node in a peer-to-peer content distribution system. Upon receiving an announcement that a peer node claims to possess a content item, the tracker node in one embodiment obtains the content item, selects a random portion of the content item; formulates a challenge based on the random portion of the content item and determines an expected challenge response. The challenge may comprise, for example, a request for a hash of the random portion (or alternatively, a hash of the random portion and a random seed value). The tracker node issues the challenge to the announcing node and verifies the announcing node's possession of the content item if the challenge response from the announcing node matches the expected challenge response.

    摘要翻译: 跟踪器节点验证对等内容分发系统中的对等节点的内容占有。 在接收到对等节点声称拥有内容项目的通知时,一个实施例中的跟踪者节点获得内容项目,选择内容项目的随机部分; 基于内容项的随机部分来制定挑战并确定期望的挑战响应。 挑战可以包括例如对随机部分(或者替代地,随机部分的散列和随机种子值)的散列的请求。 如果来自通告节点的挑战响应与预期挑战响应匹配,则跟踪器节点向通知节点发出挑战并且验证通知节点对内容项目的拥有。

    SECURE KEY MANAGEMENT IN CONFERENCING SYSTEM
    36.
    发明申请
    SECURE KEY MANAGEMENT IN CONFERENCING SYSTEM 有权
    会议系统中的安全关键管理

    公开(公告)号:US20120322416A1

    公开(公告)日:2012-12-20

    申请号:US13596823

    申请日:2012-08-28

    IPC分类号: H04W12/06

    摘要: A method for managing a conference between two or more parties comprises an identity based authenticated key exchange between a conference management element and each of the two or more parties seeking to participate in the conference. Messages exchanged between the conference management element and the two or more parties are encrypted based on respective identities of recipients of the messages. The method comprises the conference management element receiving from each party a random group key component. The random group key component is computed by each party based on a random number used by the party during the key authentication operation and random key components computed by a subset of others of the two or more parties seeking to participate in the conference. The conference management element sends to each party the random group key components computed by the parties such that each party can compute the same group key.

    摘要翻译: 一种用于在两个或多个方之间管理会议的方法包括会议管理元件与寻求参加会议的两个或多个方中的每个之间的基于身份的认证密钥交换。 在会议管理单元与两个或多个会话之间交换的消息基于消息的接收者的相应身份被加密。 该方法包括从各方接收随机组密钥分量的会议管理单元。 随机组密钥分量由各方根据在密钥认证操作期间由该方使用的随机数和由寻求参与会议的两个或多个方的其他人的子集计算的随机密钥分量来计算。 会议管理单元向各方发送由各方计算的随机组密钥分量,使得各方可以计算相同的组密钥。

    METHOD AND APPARATUS FOR COMMUNICATION BETWEEN WIRELESS TELECOMMUNICATIONS NETWORKS OF DIFFERENT TECHNOLOGY TYPES
    37.
    发明申请
    METHOD AND APPARATUS FOR COMMUNICATION BETWEEN WIRELESS TELECOMMUNICATIONS NETWORKS OF DIFFERENT TECHNOLOGY TYPES 有权
    不同技术类型的无线电信网络之间的通信方法与装置

    公开(公告)号:US20110188469A1

    公开(公告)日:2011-08-04

    申请号:US12935852

    申请日:2009-03-13

    IPC分类号: H04W36/14

    摘要: For handover between wireless telecommunications networks of different technology types, an air interface is set up between a first node 4 included in a network of a first technology type and a second node 10 included in a network of a second different technology type. Signaling messaging, in accordance with the second technology type, is related to handover of a mobile terminal from the network of the first technology type to the network of the second technology type. The signaling messaging is encapsulated in a container for transmission over the signaling interface. An identifier is associated with the container to indicate that it encapsulates the signaling messaging. When the identifier is detected at the first node, the container is sent over the interface to the second node. In one method in accordance with the invention, the first technology type is WiMAX and the identifier is a special service flow identifier. This may be detected at an Access Services Network Gateway (ASN GW), for example. A method in accordance with the invention thus permits the use of logical radio channels for encapsulating inter-technology signaling.

    摘要翻译: 对于不同技术类型的无线电信网络之间的切换,在包括在第一技术类型的网络中的第一节点4和第二不同技术类型的网络中包括的第二节点10之间建立空中接口。 根据第二技术类型的信令消息传送涉及移动终端从第一技术类型的网络到第二技术类型的网络的切换。 信令消息被封装在容器中,用于通过信令接口进行传输。 标识符与容器相关联,以指示其封装信令消息。 当在第一节点处检测到标识符时,容器通过接口发送到第二节点。 在根据本发明的一种方法中,第一种技术类型是WiMAX,标识符是特殊业务流标识符。 例如,这可以在接入服务网络网关(ASN GW)处检测。 因此,根据本发明的方法允许使用逻辑无线电信道来封装技术间信令。

    Session Key Generation and Distribution with Multiple Security Associations per Protocol Instance
    38.
    发明申请
    Session Key Generation and Distribution with Multiple Security Associations per Protocol Instance 有权
    每个协议实例具有多个安全关联的会话密钥生成和分发

    公开(公告)号:US20100303238A1

    公开(公告)日:2010-12-02

    申请号:US12474764

    申请日:2009-05-29

    IPC分类号: H04L9/14

    摘要: A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a communication system. In one aspect, a first one of the security associations is utilized to secure data sent between the user equipment and the first network element in an ongoing communication. In conjunction with a handoff of the ongoing communication from the first network element to a second network element of the communication system, another one of the security associations is selected, and the other selected security association is utilized to secure data sent between the user equipment and the second network element in the ongoing communication. The security associations may comprise respective sets of session keys derived from a single pairwise master key.

    摘要翻译: 执行会话密钥生成协议的单个实例,以便在用户设备和通信系统的第一网络元件之间生成多个安全关联。 在一个方面,安全关联中的第一个被用于在正在进行的通信中保护在用户设备和第一网络元件之间发送的数据。 结合从第一网络元件到通信系统的第二网络元件的正在进行的通信的切换,选择另一个安全关联,并且使用另一个选择的安全关联来保护在用户设备和 正在进行的通信中的第二个网络元素。 安全关联可以包括从单个成对主密钥导出的各组会话密钥。

    Communication of Session-Specific Information to User Equipment from an Access Network
    39.
    发明申请
    Communication of Session-Specific Information to User Equipment from an Access Network 有权
    会话专用信息从接入网络向用户设备的通信

    公开(公告)号:US20100235890A1

    公开(公告)日:2010-09-16

    申请号:US12401287

    申请日:2009-03-10

    IPC分类号: H04L29/06 H04L12/28

    CPC分类号: H04W12/06 H04W76/10

    摘要: In conjunction with establishment of a session between an access network and user equipment of a communication system, session-specific information is transmitted from the access network to the user equipment. The session-specific information transmitted from the access network to the user equipment comprises information to be utilized in an authentication protocol carried out between the user equipment and an authentication server of the system. For example, the session-specific information transmitted from the access network to the user equipment may comprise an identifier of a gateway coupled between the access network and the authentication server.

    摘要翻译: 结合在通信系统的接入网络和用户设备之间的会话的建立,会话专用信息从接入网络发送到用户设备。 从接入网向用户设备发送的会话特定信息包括在用户设备与系统的认证服务器之间进行的认证协议中使用的信息。 例如,从接入网络发送到用户设备的特定于会话的信息可以包括耦合在接入网络和认证服务器之间的网关的标识符。

    Method for secure network based route optimization in mobile networks
    40.
    发明授权
    Method for secure network based route optimization in mobile networks 有权
    移动网络中基于安全网络的路由优化方法

    公开(公告)号:US09258696B2

    公开(公告)日:2016-02-09

    申请号:US12369374

    申请日:2009-02-11

    摘要: The present invention provides a method of route optimization involving a first mobile device associated with a first home gateway. One embodiment of the method is implemented in a first mobility forwarding entity and includes registering the first mobile device at the first mobility forwarding entity. The first mobile device is registered using a session key included in a registration message transmitted by the first mobile device. The embodiment also includes establishing a secure route between the first mobility forwarding entity and a terminating node using the session key. The secure route bypasses the first home gateway.

    摘要翻译: 本发明提供了涉及与第一家庭网关相关联的第一移动设备的路由优化的方法。 该方法的一个实施例在第一移动性转发实体中实现,并且包括在第一移动性转发实体处注册第一移动设备。 使用包括在由第一移动设备发送的注册消息中的会话密钥来登记第一移动设备。 该实施例还包括使用会话密钥在第一移动性转发实体和终止节点之间建立安全路由。 安全路由绕过第一个家庭网关。