Authenticating a device in a network
    51.
    发明授权
    Authenticating a device in a network 有权
    验证网络中的设备

    公开(公告)号:US09407616B2

    公开(公告)日:2016-08-02

    申请号:US14113047

    申请日:2011-04-27

    摘要: There is disclosed a system for authentication of a device in a network by establishing a second security context between the device and a serving network node when a first security context has previously been established, assisted by an authentication server, based on a random value and a secret shared between an identity module associated with the device and the authentication server. First re-use information from the establishment of the first security context is stored at the authentication server and at the device, the first re-use information enabling secure generation of the second security context from the random value and the secret. Second re-use information may be generated or stored at the device. A context regeneration request is generated at the device, the context regeneration request authenticated at least partly based on the secret. The context regeneration request is sent to the serving network node. The context regeneration request is sent from the serving network node to the authentication server. The context regeneration request is verified at the authentication server. The second security context is generated at the authentication server based on at least the secret, the random value, and the first and second re-use information. The second security context is communicated from the authentication server to the serving network node.

    摘要翻译: 公开了一种用于通过基于随机值和由认证服务器辅助的先前建立第一安全上下文而在设备和服务网络节点之间建立第二安全上下文的网络中的设备的认证系统。 在与设备相关联的身份模块和认证服务器之间共享秘密。 来自建立第一安全上下文的第一重新使用信息被存储在认证服务器和设备处,第一重用信息使得能够从随机值和秘密安全地生成第二安全上下文。 可以在设备处生成或存储第二重用信息。 在设备上生成上下文再生请求,上下文再生请求至少部分地基于秘密进行认证。 上下文再生请求被发送到服务网络节点。 上下文再生请求从服务网络节点发送到认证服务器。 认证服务器验证上下文再生请求。 至少基于秘密,随机值以及第一和第二再利用信息,在认证服务器产生第二安全上下文。 第二安全上下文从认证服务器传送到服务网络节点。

    Method and arrangement for creation of association between user equipment and an access point
    52.
    发明授权
    Method and arrangement for creation of association between user equipment and an access point 有权
    用于创建用户设备和接入点之间的关联的方法和装置

    公开(公告)号:US08811987B2

    公开(公告)日:2014-08-19

    申请号:US13140818

    申请日:2008-12-19

    IPC分类号: H04M1/66 H04M3/00 H04W4/00

    摘要: Methods, apparatus, and computer program products for creating an association between a first user equipment and at least one access point assisted by a registration server in a telecommunication network are disclosed. The registration server responds to a first contact request carried out using a first association number for the access point, provided by the first user equipment, receives a first association request for the association with the access point, provided by the first user equipment, authorizes the first association request based on a first authorization information provided by the first user equipment; registers the association between the first user equipment and the access point responsive to authorization of the first association request. The first user equipment is associated with the access point and the association is administered by the registration server.

    摘要翻译: 公开了用于在第一用户设备和由电信网络中的注册服务器辅助的至少一个接入点之间建立关联的方法,设备和计算机程序产品。 注册服务器响应由第一用户设备提供的接入点的第一关联号码执行的第一联系请求,接收由第一用户设备提供的与接入点的关联的第一关联请求,授权 基于由第一用户设备提供的第一授权信息的第一关联请求; 响应于第一关联请求的授权,注册第一用户设备和接入点之间的关联。 第一用户设备与接入点相关联,该关联由注册服务器管理。

    Secure Communication
    53.
    发明申请
    Secure Communication 有权
    安全通信

    公开(公告)号:US20140215217A1

    公开(公告)日:2014-07-31

    申请号:US14342414

    申请日:2011-09-08

    IPC分类号: H04L29/06

    摘要: A method comprising the use of a bootstrapping protocol to define a security relationship between a first server and a second server, the first and second servers co-operating to provide a service to a user terminal. A bootstrapping protocol is used to generate a shared key for securing communication between the first server and the second server. The shared key is based on a context of the bootstrapping protocol, and the context is associated with a Subscriber Identity Module (SIM) associated with the user terminal and provides a base for the shared key. A method of the invention may, for example, be employed within a computing/service network such as a “cloud”, and in particular for communications between two servers in the cloud that are co-operating to provide a service to a user.

    摘要翻译: 一种方法,包括使用自举协议来定义第一服务器和第二服务器之间的安全关系,所述第一和第二服务器合作以向用户终端提供服务。 引导协议用于生成用于保护第一服务器和第二服务器之间的通信的共享密钥。 共享密钥基于引导协议的上下文,并且上下文与与用户终端相关联的订户身份模块(SIM)相关联,并为共享密钥提供基础。 例如,本发明的方法可以在诸如“云”的计算/服务网络内使用,并且特别地用于云中的两个服务器之间的通信,这些服务器正在协作以向用户提供服务。

    Methods and apparatus for secure routing of data packets
    54.
    发明授权
    Methods and apparatus for secure routing of data packets 失效
    数据包安全路由的方法和装置

    公开(公告)号:US08788705B2

    公开(公告)日:2014-07-22

    申请号:US13520301

    申请日:2010-01-04

    IPC分类号: G06F15/173

    CPC分类号: H04L45/00 H04L63/04 H04L63/06

    摘要: Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical parameters in which the hops of a predetermined transmission path between a sender and a receiver are encoded. A name server generates and distributes router-associated keys to routers in the network which keys are used for computing the hierarchical parameters.

    摘要翻译: 通过采用编码发送器和接收器之间的预定传输路径的跳的层次参数来支持通过分组交换网络路由数据分组时在路由器中的转发过程的方法和装置。 名称服务器生成并将与路由器相关的密钥分发给网络中用于计算分层参数的密钥的路由器。

    Method and arrangement for enabling play-out of media
    55.
    发明授权
    Method and arrangement for enabling play-out of media 有权
    实现媒体播放的方法和布置

    公开(公告)号:US08738910B2

    公开(公告)日:2014-05-27

    申请号:US13514100

    申请日:2009-12-07

    IPC分类号: H04L9/32

    摘要: Methods and arrangements for enabling the use of a first device (300) for controlling transfer of media content from a content provider (306) to a second device (302). The first device has a pre-established security association with the communications network. When the network detects a request made by the first device for delivery of media content to the second device, key information is established which enables determination of one or more media keys for encryption of the media content. The network sends key information to the content provider and to the first device. The content provider then delivers media content encrypted by the media key(s) to the second device. Further, the first device forward the media key(s) over a local communication link to the second device for decryption of media content encrypted by the media key(s) when delivered by the content provider.

    摘要翻译: 允许使用第一设备(300)来控制媒体内容从内容提供商(306)传送到第二设备(302)的方法和装置。 第一个设备与通信网络有预先建立的安全关联。 当网络检测到由第一设备发送用于向第二设备传送媒体内容的请求时,建立了能够确定用于加密媒体内容的一个或多个媒体密钥的密钥信息。 网络向内容提供商和第一个设备发送密钥信息。 然后,内容提供商将由媒体密钥加密的媒体内容传送到第二设备。 此外,当由内容提供商递送时,第一设备通过本地通信链路将媒体密钥转发到第二设备以解密由媒体密钥加密的媒体内容。

    Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product
    56.
    发明授权
    Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product 有权
    基于安全分析技术系统重新配置的设备和相应的技术决策支持系统和计算机程序产品

    公开(公告)号:US08646085B2

    公开(公告)日:2014-02-04

    申请号:US12682542

    申请日:2008-09-23

    IPC分类号: G06F21/00

    CPC分类号: G06Q10/06 G06F21/577

    摘要: The invention relates to an apparatus for analyzing and reconfiguring a technical system (2) with respect to security, as well as a corresponding decision support system and computer program product. A graph constructor (20) provides, based on technical information about the system (2) received via an input interface (10), a representation of potential attacks in a directed graph of attack nodes. A system/countermeasure analysis unit (30) ranks different sets of countermeasures to enable a selected set of countermeasures to be taken to improve security. The analysis unit (30) performs the following procedure for each set of countermeasures: i) logically apply the set of countermeasures to attacks in the directed graph, and ii) determine a rank of the applied set of countermeasures based on the effectiveness of the countermeasures with respect to the reduction of the risk of attacks. An output and/or control unit (40) may then provide appropriate control signaling and/or effectuate appropriate control actions for reconfiguration of the technical system (2).

    摘要翻译: 本发明涉及一种用于分析和重新配置关于安全性的技术系统(2)的装置,以及相应的决策支持系统和计算机程序产品。 图形构造器(20)基于通过输入接口(10)接收的关于系统(2)的技术信息,提供攻击节点的有向图中的潜在攻击的表示。 系统/对策分析单元(30)排列不同的对策组以使得能够采取所选择的一组对策来提高安全性。 分析单元(30)针对每一套对策执行以下过程:i)在有向图中逻辑应用攻击对策,ii)根据对策的有效性确定所应用的一套对策的等级 关于减少攻击的风险。 然后,输出和/或控制单元(40)可以为技术系统(2)的重新配置提供适当的控制信令和/或实现适当的控制动作。

    Managing user access in a communications network
    57.
    发明授权
    Managing user access in a communications network 有权
    管理通信网络中的用户访问

    公开(公告)号:US08462947B2

    公开(公告)日:2013-06-11

    申请号:US12520476

    申请日:2006-12-19

    IPC分类号: H04K1/00 G06F21/00

    摘要: A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.

    摘要翻译: 一种操作节点的方法,用于在接入网络之间执行切换,其中用户已经在第一接入网络中对网络接入进行了认证。 该方法包括:在通信会话期间,从家庭网络接收分配给用户的第一会话密钥和临时标识符。 标识符被映射到第一个会话密钥,映射的标识符和密钥存储在节点处。 从第一会话密钥导出第二会话密钥,将第二会话密钥发送到接入网络,并将该标识符发送给用户终端。 当用户随后移动到第二接入网络时,节点从用户终端接收标识符。 然后,节点检索映射到接收到的标识符的第一会话密钥,导出第三会话密钥,并将第三会话密钥发送到第二接入网络。

    Methods and Arrangements for Direct Mode Communication
    58.
    发明申请
    Methods and Arrangements for Direct Mode Communication 有权
    直接模式通信的方法和布置

    公开(公告)号:US20130084854A1

    公开(公告)日:2013-04-04

    申请号:US13703677

    申请日:2010-06-22

    IPC分类号: H04W4/00

    CPC分类号: H04W4/008 H04W4/80 H04W76/14

    摘要: A method in a first user equipment (UE 1) connectable to a second user equipment (UE 2) via a communication network or via a direct radio communication link, of using a direct radio communication link for communication between the UEs is initiated when one of the UEs receives probe signaling information comprising a first probe token via the communication network. The UEs exchange probe signaling messages including a second and/or the first probe token at least partly according to the probe signaling information, such that one of the UEs can compare the probe tokens, generate a probing report and provide the probing report to the communication network, or to the opposite UE for evaluation in case of a successful comparison and such that a direct radio communication link can be used for communication with UE 2 in response to receiving instructions to use the second direct radio communication link from the entity by which the probing report was evaluated.

    摘要翻译: 当通过通信网络或经由直接无线电通信链路连接到第二用户设备(UE 2)的第一用户设备(UE 1)中使用直接无线电通信链路用于UE之间的通信的方法被启动, UE经由通信网络接收包括第一探测令牌的探测信令信息。 UE至少部分地根据探测信令信息来交换包括第二和/或第一探测令牌的探测信令消息,使得UE中的一个可以比较探测令牌,生成探测报告并向通信提供探测报告 网络或相对的UE进行评估,以便在成功比较的情况下进行评估,并且使得直接无线电通信链路可以用于响应于接收到使用来自所述实体的第二直接无线电通信链路的指令与UE 2通信, 探测报告进行了评估。

    Method and Arrangement for Enabling Play-Out of Media
    59.
    发明申请
    Method and Arrangement for Enabling Play-Out of Media 有权
    实现媒体播放的方法和安排

    公开(公告)号:US20120246480A1

    公开(公告)日:2012-09-27

    申请号:US13514100

    申请日:2009-12-07

    IPC分类号: H04L9/32

    摘要: Methods and arrangements for enabling the use of a first device (300) for controlling transfer of media content from a content provider (306) to a second device (302). The first device has a pre-established security association with the communications network. When the network detects a request made by the first device for delivery of media content to the second device, key information is established which enables determination of one or more media keys for encryption of the media content. The network sends key information to the content provider and to the first device. The content provider then delivers media content encrypted by the media key(s) to the second device. Further, the first device forward the media key(s) over a local communication link to the second device for decryption of media content encrypted by the media key(s) when delivered by the content provider.

    摘要翻译: 允许使用第一设备(300)来控制媒体内容从内容提供商(306)传送到第二设备(302)的方法和装置。 第一个设备与通信网络有预先建立的安全关联。 当网络检测到由第一设备发送用于向第二设备传送媒体内容的请求时,建立了能够确定用于加密媒体内容的一个或多个媒体密钥的密钥信息。 网络向内容提供商和第一个设备发送密钥信息。 然后,内容提供商将由媒体密钥加密的媒体内容传送到第二设备。 此外,当由内容提供商递送时,第一设备通过本地通信链路将媒体密钥转发到第二设备以解密由媒体密钥加密的媒体内容。

    Security in a mobile communication system
    60.
    发明授权
    Security in a mobile communication system 有权
    移动通信系统中的安全

    公开(公告)号:US08275403B2

    公开(公告)日:2012-09-25

    申请号:US12838056

    申请日:2010-07-16

    IPC分类号: H04W88/02

    摘要: When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile terminal has an executable program (14) configured to interact with the basic identity module for emulating an identity module according to the second security standard. If it is concluded that the mobile terminal has such an executable program, a security algorithm is executed at the home network (30) to provide security data according to the second security standard. At least part of these security data are then transferred, transparently to a visited network (20), to the mobile terminal (10). On the mobile terminal side, the executable program (14) is executed for emulating an identity module according to the second security standard using at least part of the transferred security data as input. Preferably, the first security standard corresponds to a 2G standard, basically the GSM standard and the second security standard at least in part corresponds to a 3G standard such as the UMTS standard, and/or the IP Multimedia Sub-system (IMS) standard.

    摘要翻译: 当具有根据第一安全标准操作的基本身份模块(12)的移动终端(10)启动服务访问时,家庭网络(30)确定移动终端是否具有被配置为相互作用的可执行程序(14) 具有用于根据第二安全标准模拟身份模块的基本身份模块。 如果确定移动终端具有这样的可执行程序,则在归属网络(30)处执行安全算法以根据第二安全标准提供安全数据。 这些安全数据的至少一部分然后被透明地传送到被访问网络(20)到移动终端(10)。 在移动终端侧,执行可执行程序(14),用于使用至少部分传送的安全数据作为输入来根据第二安全标准来模拟身份模块。 优选地,第一安全标准对应于2G标准,基本上GSM标准和第二安全标准至少部分地对应于诸如UMTS标准和/或IP多媒体子系统(IMS)标准的3G标准。