Methods and apparatuses for secure information sharing in social networks using randomly-generated keys
    1.
    发明授权
    Methods and apparatuses for secure information sharing in social networks using randomly-generated keys 有权
    使用随机生成的密钥在社交网络中进行安全信息共享的方法和装置

    公开(公告)号:US08769259B2

    公开(公告)日:2014-07-01

    申请号:US13345241

    申请日:2012-01-06

    IPC分类号: H04L29/06

    CPC分类号: H04L9/0822

    摘要: There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.

    摘要翻译: 社交网络通信的安全性可能存在问题。 例如,当许多朋友希望通过社交网络基础设施安全地进行通信时,可能会出现这样的情况,使得诸如社交网络运营商或提供应用基础设施的主机之类的非信任的第三方实体不会听到 通讯。 针对上述问题,所提出的实施例提出了一组创新的,轻量级的解决方案,考虑到在某些情况下,社交网络运营商可能不是可靠的实体。 本发明的实施例涉及使用随机密钥的社交网络中的安全信息共享的方法和装置。

    Methods And Apparatuses For Secure Information Sharing In Social Networks Using Randomly-Generated Keys
    3.
    发明申请
    Methods And Apparatuses For Secure Information Sharing In Social Networks Using Randomly-Generated Keys 有权
    使用随机生成密钥的社会网络中的安全信息共享的方法和设备

    公开(公告)号:US20130179679A1

    公开(公告)日:2013-07-11

    申请号:US13345241

    申请日:2012-01-06

    IPC分类号: H04L29/06

    CPC分类号: H04L9/0822

    摘要: There can be problems with the security of social networking communications. For example, there may be occasions when a number of friends wish to communicate securely through a social network infrastructure, such that non-trusted 3rd-party entities, such as a Social Network Operator or host that provides the application infrastructure, does not overhear the communication. In response to the above problems, embodiments presented propose a set of innovative, lightweight solutions, considering that in certain scenarios the Social Network Operator may not be a trusted entity. Embodiments of the present invention are directed to methods and apparatuses for secure information sharing in social networks using random keys.

    摘要翻译: 社交网络通信的安全性可能存在问题。 例如,当许多朋友希望通过社交网络基础设施安全地进行通信时,可能会出现这样的情况,使得诸如社交网络运营商或提供应用基础设施的主机之类的非信任的第三方实体不会听到 通讯。 针对上述问题,所提出的实施例提出了一组创新的,轻量级的解决方案,考虑到在某些情况下,社交网络运营商可能不是可靠的实体。 本发明的实施例涉及使用随机密钥的社交网络中的安全信息共享的方法和装置。

    Manipulation and restoration of authentication challenge parameters in network authentication procedures
    4.
    发明授权
    Manipulation and restoration of authentication challenge parameters in network authentication procedures 有权
    网络认证过程中的认证挑战参数的操作和恢复

    公开(公告)号:US09537663B2

    公开(公告)日:2017-01-03

    申请号:US13528802

    申请日:2012-06-20

    IPC分类号: H04L9/32 H04W12/06 H04L29/06

    摘要: A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.

    摘要翻译: 提供在网络认证期间使用的挑战操纵和恢复能力。 移动设备(MD)和订户服务器(SS)各自已经提供了与MD的网络认证模块(NAM)的订户身份相关联的绑定密钥(B-KEY)。 当MD尝试附加到RAN时,SS响应于来自无线电接入网络(RAN)的请求而获得认证向量(AV)。 AV包括原始认证挑战参数(ACP)。 SS根据其B-KEY加密原始ACP,并通过用加密的ACP替换原始ACP来更新AV。 MD接收加密的ACP,并根据其B-KEY对加密的ACP进行解密,以恢复原来的ACP。 MD将原始ACP提供给NAM,用于计算用于RAN的验证的认证响应。

    Secure group messaging
    5.
    发明授权
    Secure group messaging 有权
    安全群组讯息

    公开(公告)号:US09166778B2

    公开(公告)日:2015-10-20

    申请号:US13548835

    申请日:2012-07-13

    IPC分类号: H04L9/08 H04L9/30

    摘要: A method for securing at least one message transferred in a communication system from a first computing device to a second computing device in a peer-to-peer manner. At the first computing device, an identity based authenticated key exchange session is established with a third computing device operating as a peer authenticator. The identity based authenticated key exchange session has an identity based authenticated session key associated therewith. The first computing device obtains from the third computing device a random key component of the second computing device, wherein the random key component of the second computing device is encrypted by the third computing device using the identity based authenticated session key prior to sending the random key component of the second computing device to the first computing device. A peer-to-peer messaging key is computed at the first computing device using the random key component of the second computing device.

    摘要翻译: 一种用于将通信系统中传送的至少一个消息从第一计算设备以对等方式保护到第二计算设备的方法。 在第一计算设备处,基于身份的认证密钥交换会话与作为对等体认证者操作的第三计算设备建立。 基于身份的认证密钥交换会话具有与其相关联的基于身份的经认证的会话密钥。 第一计算设备从第三计算设备获得第二计算设备的随机密钥组件,其中第二计算设备的随机密钥组件在发送随机密钥之前由第三计算设备使用基于身份的认证会话密钥加密 第二计算设备的组件到第一计算设备。 使用第二计算设备的随机密钥组件在第一计算设备处计算对等消息传递密钥。

    DISCOVERING PROXIMITY DEVICES IN BROADBAND NETWORKS
    6.
    发明申请
    DISCOVERING PROXIMITY DEVICES IN BROADBAND NETWORKS 有权
    在宽带网络中发现接近设备

    公开(公告)号:US20140004796A1

    公开(公告)日:2014-01-02

    申请号:US13534976

    申请日:2012-06-27

    IPC分类号: H04W24/00 H04B7/26

    CPC分类号: H04W76/14 H04W8/005

    摘要: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.

    摘要翻译: 一种在通信网络上为多个移动台提供对等点发现的方法,所述多个移动站包括至少第一移动站和第二移动站,包括在网络单元处检测到第一和第二移动站处于邻近 相互之间; 在所述检测之后,在所述网元生成确定结果,所述确定结果指示所述第一移动台和所述第二移动台是否能够基于所述第一和第二移动台的信号接收质量彼此链接到设备(D2D); 以及基于所述确定结果在所述网元处生成D2D能力消息,所述D2D能力消息指示所述第一和第二移动台能够彼此建立D2D链路。

    MANIPULATION AND RESTORATION OF AUTHENTICATION CHALLENGE PARAMETERS IN NETWORK AUTHENTICATION PROCEDURES
    7.
    发明申请
    MANIPULATION AND RESTORATION OF AUTHENTICATION CHALLENGE PARAMETERS IN NETWORK AUTHENTICATION PROCEDURES 有权
    网络认证程序中的认证挑战参数的修改和恢复

    公开(公告)号:US20130343538A1

    公开(公告)日:2013-12-26

    申请号:US13528802

    申请日:2012-06-20

    IPC分类号: H04W12/06 H04K1/00

    摘要: A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.

    摘要翻译: 提供在网络认证期间使用的挑战操纵和恢复能力。 移动设备(MD)和订户服务器(SS)各自已经提供了与MD的网络认证模块(NAM)的订户身份相关联的绑定密钥(B-KEY)。 当MD尝试附加到RAN时,SS响应于来自无线电接入网络(RAN)的请求而获得认证向量(AV)。 AV包括原始认证挑战参数(ACP)。 SS根据其B-KEY加密原始ACP,并通过用加密的ACP替换原始ACP来更新AV。 MD接收加密的ACP,并根据其B-KEY对加密的ACP进行解密,以恢复原来的ACP。 MD将原始ACP提供给NAM,用于计算用于RAN的验证的认证响应。

    Secure communications for computing devices utilizing proximity services
    8.
    发明授权
    Secure communications for computing devices utilizing proximity services 有权
    使用邻近服务的计算设备的安全通信

    公开(公告)号:US09240881B2

    公开(公告)日:2016-01-19

    申请号:US13460035

    申请日:2012-04-30

    摘要: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.

    摘要翻译: 公开了用于在利用通信系统中的邻近服务的计算设备之间建立安全通信的技术。 例如,在通信系统中提供安全通信的方法包括以下步骤。 至少一个密钥从接入网络的至少一个网络元件发送到第一计算设备和至少第二计算设备。 第一计算设备和第二计算设备利用接入网络来访问通信系统,并且在发送密钥之前由接入网络进行认证。 该密钥可由第一计算设备和第二计算设备在彼此接近的情况下彼此安全地彼此通信,而无需第一计算设备和通过接入网络的第二计算设备之间的通信。

    Discovering proximity devices in broadband networks
    9.
    发明授权
    Discovering proximity devices in broadband networks 有权
    发现宽带网络中的邻近设备

    公开(公告)号:US08849203B2

    公开(公告)日:2014-09-30

    申请号:US13534976

    申请日:2012-06-27

    IPC分类号: H04B7/00

    CPC分类号: H04W76/14 H04W8/005

    摘要: A method of providing peer to peer discovery for a plurality of mobiles on a communications network, the plurality of mobiles including at least a first mobile and a second mobile, includes detecting, at a network element, that the first and second mobiles are in proximity with respect to one another; generating a determination result at the network element after the detecting, the determination result indicating whether the first and second mobiles are capable of establishing a direct device to device (D2D) link with one another based on signal reception qualities of the first and second mobiles; and generating a D2D capability message at the network element based on the determination result, the D2D capability message indicating that the first and second mobiles are capable of establishing a D2D link with one another.

    摘要翻译: 一种在通信网络上为多个移动台提供对等点发现的方法,所述多个移动站包括至少第一移动站和第二移动站,包括在网络单元处检测到第一和第二移动站处于邻近 相互之间; 在所述检测之后,在所述网元生成确定结果,所述确定结果指示所述第一移动台和所述第二移动台是否能够基于所述第一和第二移动台的信号接收质量彼此链接到设备(D2D); 以及基于所述确定结果在所述网元处生成D2D能力消息,所述D2D能力消息指示所述第一和第二移动台能够彼此建立D2D链路。

    SECURE COMMUNICATIONS FOR COMPUTING DEVICES UTILIZING PROXIMITY SERVICES
    10.
    发明申请
    SECURE COMMUNICATIONS FOR COMPUTING DEVICES UTILIZING PROXIMITY SERVICES 有权
    使用临时性服务的计算设备的安全通信

    公开(公告)号:US20130290696A1

    公开(公告)日:2013-10-31

    申请号:US13460035

    申请日:2012-04-30

    IPC分类号: H04L9/08 H04L29/06

    摘要: Techniques are disclosed for establishing secure communications between computing devices utilizing proximity services in a communication system. For example, a method for providing secure communications in a communications system comprises the following steps. At least one key is sent from at least one network element of an access network to a first computing device and at least a second computing device. The first computing device and the second computing device utilize the access network to access the communication system and are authenticated by the access network prior to the key being sent. The key is useable by the first computing device and the second computing device to securely communicate with one another when in proximity of one another without communications between the first computing device and the second computing device going through the access network.

    摘要翻译: 公开了用于在利用通信系统中的邻近服务的计算设备之间建立安全通信的技术。 例如,在通信系统中提供安全通信的方法包括以下步骤。 至少一个密钥从接入网络的至少一个网络元件发送到第一计算设备和至少第二计算设备。 第一计算设备和第二计算设备利用接入网络来访问通信系统,并且在发送密钥之前由接入网络进行认证。 该密钥可由第一计算设备和第二计算设备在彼此接近的情况下彼此安全地彼此通信,而无需第一计算设备和通过接入网络的第二计算设备之间的通信。