摘要:
Provided are a method, a corresponding apparatus and a computer program product for performing a group authentication and key agreement procedure. A method comprises initiating, by a master device in a group of devices, a group authentication and key agreement procedure towards an authentication entity, wherein a shared group key is defined for use in the group authentication and key agreement procedure; performing mutual authentication between the master device and the authentication entity based upon the shared group key; and performing mutual authentication between the authenticated master device and other devices in the group based upon the shared group key for completion of the group authentication and key agreement procedure. With the claimed invention, the impact of the signaling overhead on a network can be significantly decreased without substantive modification to the existing architecture of the network.
摘要:
A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second mobile apparatus. The first mobile apparatus may be provisioned with network access credential information to be transferred from the first mobile apparatus to the second mobile apparatus. The method may further include causing the information about the second mobile apparatus to be provided to a provisioning apparatus for the network. The method may additionally include receiving authorization form the provisioning apparatus to transfer the network access credential information from the first mobile apparatus to the second mobile apparatus. The method may also include, in response to receipt of the authorization, causing the network access credential information to be provided to the second mobile apparatus. A corresponding apparatus is also provided.
摘要:
Methods, apparatuses, and computer program products herein enable a communication device to enable the bundling of one or more connection requests in order to reduce overall signaling from a communication device. An example method may include receiving a connection request from an application. In some example embodiments, the connection request defines a connection time indication. The method may further include receiving at least one additional connection request from one or more applications. The method may further include determining a connection time for the application and the one or more applications. In some example embodiments, the connection time is configured to enable the application and the one or more applications to utilize the connection concurrently. The method may further include causing a connection to be established at a connection time. In some example embodiments, the connection time is scheduled prior to an expiration of the connection time indication.
摘要:
A method, apparatus and computer program product are provided to facilitate authentication of a request, such as by a mobile terminal, while also supplying information about the user to a service, website, application or the like A method, apparatus and computer program product may provide for interworking a bootstrapping architecture, such as Generic Bootstrapping Architecture, and a shared identity service, such as OpenID architecture In this regard, a method, apparatus and computer program product may provide for a secure session with a service provider through Generic Bootstrapping Architecture while being able to supply the service provider with the user information and/or accessing a user account using OpenID architecture.
摘要:
A method, apparatus and software for accessing a database having, for each of a plurality of subscribers of a mobile communication network, a long-term secret key shared between the subscriber and the apparatus, for network authentication of a mobile communication device to the mobile communication network; wherein the mobile communication network is a universal mobile telecommunications system or a long term evolution telecommunication network; and producing for the mobile communication device, the authentication of which is being verified, one or more authentication vectors compliant with the global system for mobile communications; each authentication vector comprising a challenge, a signed response and a session key; and containing in the authentication vector an integrity key and an authentication token.
摘要:
Various methods for providing a secure public warning related to a disaster are provided. One example method may comprise providing for transmission of a registration message. The registration message may comprise an indication of an identity and an indication of a location. The method of this example embodiment may further comprise receiving a warning message. The method of this example embodiment may further comprise authenticating the warning message. Additionally, the method of this example may further comprise providing an alert after authenticating the warning message. Similar and related example methods, example apparatuses, and example computer program products are also provided.
摘要:
A method includes downloading at the request of a user an application for storage in a secure module of a terminal; requesting the user to assign a descriptive name for the downloaded application; storing the descriptive name together with an application identity of the downloaded application; in response to a request to activate a stored application, presenting the user with a list having elements of one or more stored applications, where each list element comprises at least the user assigned descriptive name; and activating an application associated with a selection of a list element by the user. Various embodiments of apparatus for implementing the method are also disclosed.
摘要:
A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.
摘要:
A method and devices for a control of usage of content is disclosed. In one embodiment, a user device performs the steps of obtaining the content, defining usage rights, generating integrity protection information for defined usage rights, encrypting the content with a content encryption key, encrypting the content encryption key with a key encryption key associated with a recipient device and/or an operator of the recipient device, communicating the encrypted content, the defined usage rights, the encrypted content encryption key, and the integrity protection information to the recipient device. The recipient device performs the steps of verifying the integrity of the defined usage rights based on the integrity protection information, decrypting the encrypted content encryption key with a decryption key corresponding to the key encryption key, decrypting the encrypted content with the content encryption key in a secure environment, applying the defined usage rights to the content in the secure environment, and using the content according to the applied usage rights.
摘要:
An apparatus (such as a AAA node of a core/operator network) receives from a relying party an initial credit control request that bears first information comprising a relying party identifier, a service context identifier for a service to be provided by the relying party, and a token that authenticates a subscriber. The first information is extracted and forwarded to a core network accounting server that stores account information for the subscriber. The relying party is not within the core network. In reply to forwarding the extracted first information, the apparatus receives from the accounting server a credit control answer that bears second information comprising the relying party identifier, the service context identifier, and a grant indicating the subscriber may be charged a fee for the service to be provided by the relying party. The second information is extracted and forwarded to the relying party.