Abstract:
An approach is provided for refreshing keys in a communication system. An application request is transmitted to a network element configured to provide secure services. A message is received, in response to the application request, indicating refreshment of a key that is used to provide secure communications with the network element. A refreshed key is derived based on the received message.
Abstract:
In one exemplary and non-limiting aspect thereof this invention provides a method to execute a bootstrapping procedure between a node, such as a MN, and a wireless network (WN). The method includes sending the WN a first message that contains a list of authentication mechanisms supported by the MN; determining in the WN an authentication mechanism to be used for bootstrapping, based at least on the list received from the MN, and including in a first response message to the MN information pertaining to the determined authentication mechanism; and sending a second message to the WN that is at least partially integrity, the second message containing the list of authentication mechanisms that the MN supports in an integrity protected form. If authentication is successful, and if the list received in the second message matches the list received in the first message, the method further includes responding to the MN with a second response message that is at least partially integrity protected, where the second response message contains an indication of the selected authentication mechanism in an integrity protected form; and receiving the successful response message and verifying that the authentication mechanism used by the MN matches the authentication mechanism selected by the WN.
Abstract:
The invention relates to a method of authenticating a user equipment in a communications network. The method involves sending a message from a network entity to the user equipment. This message includes a set of options for an authentication procedure for authenticating an internet protocol communication over a first interface between the user equipment and the network entity; said options including a “shared key”-based authentication procedure. The method also involves selecting an option from the set. In the event that the “shared-key”-based authentication procedure is selected, a shared secret from a security key established in a generic bootstrapping architecture (GBA) is generated over a second interface between the user equipment and a bootstrapping service function. The shared secret is then used to compute and verify authentication payloads in the key-based authentication procedure for the communication over the first interface.
Abstract:
A method for authenticating communicating parties is disclosed. In the method biometric information associated with a first party is generated based on a recording of the first party presenting a predefined input parameter. Said biometric information may then be transmitted to a second party. Authenticity of a security parameter associated with the first party can then be verified based on said biometric information.
Abstract:
A mobile terminal for securely communicating with a network includes a user identity module (UIM) and a user equipment module. The user equipment module includes a client application. The UIM is in operable communication with the user equipment and includes a password provisioning module (PPM), a password generating module, a response verification module (RVM) and a response generation module (RGM). The PPM is configured to store a password. The password generating module is in operable communication with the PPM and configured to generate the password. The RGM and RVM are in operable communication with both the client application and the PPM. The RGM is configured to generate an authentication response from the password in response to a request from the client application. The RVM is configured to verify a request for a server digest response and generate a verification result in response to a request from the client application.
Abstract:
A powerline network system. The system includes a power transformer device at a public utility facility. The system has a powerline box coupled to the transformer device. In a preferred embodiment, the powerline box comprises at least three lines including a first phase, a second phase, and a third phase. The first phase, the second phase, and the third phase are derived from the power transformer device. The system has a powerline coupler coupled to the first phase, the second phase, and the third phase and a multichannel data communication device coupled to the powerline coupler. In a preferred embodiment, the multichannel data communication device includes N channels, whereupon N is an integer greater than 8. The system has a first capacitor and a second capacitor coupled to the first phase and a first length of wiring between the first capacitor and the second capacitor. Preferably, the first length of wire is inductively coupled to one or more power line communication devices. The system has a third capacitor and a fourth capacitor coupled to the second phase and a second length of wiring between the third capacitor and the fourth capacitor. Preferably, the second length of wiring is inductively coupled to one or more power line communication devices. The system has a fifth capacitor and a sixth capacitor coupled to the third phase and a third length of wiring between the fifth capacitor and the sixth capacitor. Preferably, the third length of wiring is inductively coupled to one or more powerline communication devices.
Abstract:
A portable connector for power line networking. The connector includes a single AC connector, which has at least a first prong and a second prong (which will be plugged into a conventional connector device). The connector also has at least a first pair of wires coupled to the single AC connector. The first pair of wires includes a first wire coupled to the first prong and a second wire coupled to the second prong. A hardware module is coupled to the first pair of wires, which are adapted to transmit a plurality of AC signals corresponding to AC power from the AC connector and a plurality data signals from the AC connector. A single DC connector is coupled to the hardware module. A single network connector is also coupled to the hardware module.
Abstract:
A power supply apparatus and related method. The power supply apparatus has an AC input. The apparatus has a converter for converting AC power into DC power. In a specific embodiment, the converter has an input and an output. In a specific embodiment, the input of the converter is coupled to the AC input. The power supply apparatus has a DC output for voltage ranging. The output of the converter is coupled to the DC output. The apparatus also has a fan operably configured to transfer thermal energy away from the converter and a data input/output port, the data input/output port being coupled to a data signal from a data source. The apparatus has a coupler coupled between the data input/output port and the AC input. A power line module is coupled to the coupler. The power line module is adapted to convert the data signal from a first format to a second format. The second format is capable of transmission to the AC input. An enclosure is provided for the coupler. The enclosure shields the data signal from noise, e.g., high frequency noise, low frequency noise.
Abstract:
A mobile terminal for securely communicating with a network includes a user identity module (UIM) and a user equipment module. The user equipment module includes a client application. The UIM is in operable communication with the user equipment and includes a password provisioning module (PPM), a password generating module, a response verification module (RVM) and a response generation module (RGM). The PPM is configured to store a password. The password generating module is in operable communication with the PPM and configured to generate the password. The RGM and RVM are in operable communication with both the client application and the PPM. The RGM is configured to generate an authentication response from the password in response to a request from the client application. The RVM is configured to verify a request for a server digest response and generate a verification result in response to a request from the client application.
Abstract:
Method and system for powerline local area network over coaxial cable. According to an embodiment, the present invention provides a powerline communication system. The system includes a data connection that is configured to communicating a first signal in a first format. The data connection includes an input/output port. The system also includes a powerline module coupled to the input/output port of the data connection. The powerline module has a data port. The powerline module is configured to convert the first signal in the first format into a second signal into a second format. The first format is different from the second format. The system additionally includes an analog front end device that coupled to the dataport of the powerline module. The analog front end device is configured to condition the second signal for transmission over one or more powerline and/or one or more coaxial cables. Furthermore, the system includes a coupler device coupled to the analog front end device.