METHOD FOR PREFIX REACHABILITY IN A COMMUNICATION SYSTEM
    1.
    发明申请
    METHOD FOR PREFIX REACHABILITY IN A COMMUNICATION SYSTEM 审中-公开
    通信系统中前缀可达性的方法

    公开(公告)号:WO2008115126A3

    公开(公告)日:2008-11-06

    申请号:PCT/SE2008050209

    申请日:2008-02-26

    Abstract: There is disclosed a method, and a communication system, and a communication node for implementing the claimed method, for attempting to enhance legitimacy assessment and thwart a man-in-the middle or similar false-location attack by evaluating the topology of a communication-session requesting node relative to the proposed communication path through a network between the requesting node and the requested node. Upon receiving the request,a PRD (Prefix Reachability Detection) protocol is initiated, either after or during a secure key exchange, if any, which if performed preferably includes an ART (address reachability text). The PRD is executed by sending a message to the communication node challenging the location-authenticity of the requesting device. The communication node, which may be for example an access router through which the requesting node accesses the network, determines if the requesting node is positioned behind the communication node topologically, and reports the result to the requested node. The requested node may then make a decision on whether to permit the communication. If so, the PRD may be repeated one or more times while the communication session is in progress.

    Abstract translation: 公开了一种用于实现所要求保护的方法的方法,通信系统和通信节点,用于通过评估通信的拓扑来尝试增强合法性评估并阻止中间或类似的假位置攻击中的人员, 会话请求节点相对于所提出的通信路径通过请求节点和请求节点之间的网络。 在接收到请求之后,在安全密钥交换之后或期间启动PRD(前缀可达性检测)协议(如果有的话),如果执行的话,优选地包括ART(地址可达性文本)。 PRD通过向通信节点发送消息来执行,挑战请求设备的位置真实性。 通信节点可以是例如请求节点访问网络的接入路由器,确定请求节点是否在拓扑结构中位于通信节点之后,并将结果报告给所请求的节点。 然后,所请求的节点可以作出关于是否允许通信的决定。 如果是,则通信会话正在进行时,PRD可以重复一次或多次。

    CRYPTOGRAPHIC KEY MANAGEMENT IN COMMUNICATION NETWORKS
    2.
    发明申请
    CRYPTOGRAPHIC KEY MANAGEMENT IN COMMUNICATION NETWORKS 审中-公开
    通信网络中的CRYPTOGRAPHIC KEY MANAGEMENT

    公开(公告)号:WO2008048179A3

    公开(公告)日:2008-06-19

    申请号:PCT/SE2007050734

    申请日:2007-10-11

    Abstract: An authentication server and a system and method for managing cryptographic keys across different combinations of user terminals, access networks, and core networks. A Transformation Coder Entity, TCE, (25) creates a master key, Mk, which is used to derive keys during the authentication procedure. During handover between the different access types, the Mk or a transformed Mk is passed between two authenticator nodes (42, 43, 44) that hold the key in the respective access networks when a User Equipment, UE, terminal (41, 51, 52, 53) changes access. The transformation of the Mk is performed via a one-way function, and has the effect that if the Mk is somehow compromised, it is not possible to automatically obtain access to previously used master keys. The transformation is performed based on the type of authenticator node and type of UE/identity module with which the transformed key is to be utilized. The Mk is never used directly, but is only used to derive the keys that are directly used to protect the access link.

    Abstract translation: 一种认证服务器,以及用于管理跨越用户终端,接入网络和核心网络的不同组合的加密密钥的系统和方法。 转换编码器实体TCE(25)创建主密钥Mk,用于在认证过程期间导出密钥。 在不同访问类型之间的切换期间,当用户设备,UE,终端(41,51,52)处于不同接入类型的切换期间,M k或经变换的M k在两个认证节点(42,43,44)之间传递, ,53)改变访问。 通过单向函数执行Mk的转换,并且具有以下效果:如果Mk以某种方式受损,则不可能自动获得对先前使用的主密钥的访问。 基于认证者节点的类型和使用变换密钥的UE /身份模块的类型进行转换。 Mk从不直接使用,但仅用于派生直接用于保护访问链接的密钥。

    METHOD FOR ESTABLISHING A RANDOM NUMBER FOR SECURITY AND ENCRYPTION, AND A COMMUNICATIONS APPARATUS
    3.
    发明申请
    METHOD FOR ESTABLISHING A RANDOM NUMBER FOR SECURITY AND ENCRYPTION, AND A COMMUNICATIONS APPARATUS 审中-公开
    建立安全和加密的随机数的方法和通信装置

    公开(公告)号:WO2008133590A9

    公开(公告)日:2009-11-19

    申请号:PCT/SE2008050479

    申请日:2008-04-26

    Abstract: A communications apparatus includes a mobile device. The apparatus includes a receiver for receiving at the mobile device a plurality of signals carrying information including received signals which provides randomly varying data related to location of the mobile device. The apparatus includes a random number generator which generates a random number as a function of the data. The apparatus includes a cryptographic key generator which generates a cryptographic key using the random number. A method to establish at a mobile device a random number for cryptographic operations includes the steps of receiving at the mobile device a plurality of signals carrying information including received signals which provides randomly varying data related to location of the mobile device. There is the step of estimating signal entropy for at least one of the received signals in dependence of location where the signals are received by the mobile device. There is the step of selecting the at least one entropy estimated signal having estimated entropy satisfying a predetermined property. There is the step of generating from the at least one entropy estimated signal the random number.

    Abstract translation: 通信装置包括移动装置。 该装置包括接收机,用于在移动设备处接收携带包括接收信号的信息的多个信号,所述接收信号提供与移动设备的位置相关的随机变化的数据。 该装置包括随机数生成器,其生成作为数据的函数的随机数。 该装置包括使用随机数生成加密密钥的加密密钥生成器。 一种用于在移动设备处建立用于密码操作的随机数的方法包括以下步骤:在移动设备处接收携带包括接收信号的信息的多个信号,所述接收信号提供与移动设备的位置相关的随机变化的数据。 根据移动设备接收信号的位置,估计接收到的信号中的至少一个信号熵的步骤。 存在选择具有满足预定特性的估计熵的至少一个熵估计信号的步骤。 存在从至少一个熵估计信号产生随机数的步骤。

    METHOD AND APPARATUS FOR ESTABLISHING A CRYPTOGRAPHIC RELATIONSHIP IN A MOBILE COMMUNICATIONS NETWORK
    4.
    发明申请
    METHOD AND APPARATUS FOR ESTABLISHING A CRYPTOGRAPHIC RELATIONSHIP IN A MOBILE COMMUNICATIONS NETWORK 审中-公开
    在移动通信网络中建立交织关系的方法和装置

    公开(公告)号:WO2009065923A3

    公开(公告)日:2009-07-09

    申请号:PCT/EP2008065967

    申请日:2008-11-21

    Abstract: A method and apparatus for establishing a cryptographic relationship between a first node (102) and a second node (101) in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belonging to the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that is entitled to act on behalf of the first node.

    Abstract translation: 一种用于在通信网络中建立第一节点(102)和第二节点(101)之间的密码关系的方法和装置。 第一节点接收第二节点的加密属性的至少一部分,使用所接收的至少部分密码属性来生成第一节点的标识符。 加密属性可以是属于第二节点的公共密钥,并且该标识符可以是加密生成的IP地址。 密码关系允许第二节点建立一个有权代表第一个节点行动的第三个节点。

    METHOD AND APPARATUS FOR ENSURING PRIVACY IN COMMUNICATIONS BETWEEN PARTIES
    5.
    发明申请
    METHOD AND APPARATUS FOR ENSURING PRIVACY IN COMMUNICATIONS BETWEEN PARTIES 审中-公开
    在缔约方之间通信中保护隐私的方法和装置

    公开(公告)号:WO2006084895A2

    公开(公告)日:2006-08-17

    申请号:PCT/EP2006050840

    申请日:2006-02-10

    Abstract: A method of improving privacy by hiding, in an ordered sequence of messages M[x(1), D(1)], M[x(2), D(2)], etc, communicated between a first and at least one second party sharing a key k, metadata x(i) descriptive of message processing, wherein D(i) denotes payload data. The method comprises the first and the second party agreeing on a pseudo random mapping depending on a shared key k, F k , mapping at least x(i) to y(i), and the first party modifying the messages by replacing x(i) by y(i) in each message M(x(i), D(i)). The first party then transmits the modified messages maintaining their original order, and on reception of a message M(y(m), D), the second party uses a mapping G k to retrieve position m of received value and the original value x(m).

    Abstract translation: 一种通过以有序的消息M [x(1),D(1)],M [x(2),D(2)]等的顺序隐藏来提高隐私的方法,在第一和至少一个 共享密钥k的第二方,元数据x(i)描述消息处理,其中D(i)表示有效载荷数据。 该方法包括第一方和第二方根据共享密钥k至少映射至少x(i)至y(i)的伪随机映射,并且第一方修改 通过在每个消息M(x(i),D(i))中将x(i)替换y(i)的消息。 第一方然后发送修改的消息维持其原始顺序,并且在接收消息M(y(m),D)时,第二方使用映射G 来检索所接收的位置m 值和原始值x(m)。

    LAWFUL INTERCEPTION OF END-TO-END ENCRYPTED DATA TRAFFIC
    6.
    发明申请
    LAWFUL INTERCEPTION OF END-TO-END ENCRYPTED DATA TRAFFIC 审中-公开
    端到端加密数据流量的法律障碍

    公开(公告)号:WO03049357B1

    公开(公告)日:2003-11-27

    申请号:PCT/EP0214080

    申请日:2002-12-06

    Abstract: A method of facilitating the lawful interception of an IP session between two or more terminals 12,13, wherein said session uses encryption to secure traffic. The method comprises storing a key allocated to at least one of said terminals 12,13 or to at least one of the subscribers using one of the terminals 12,13, at the terminal 12,13 and at a node 5,8 within a network 1,6 through which said session is conducted, or a node coupled to that network. Prior to the creation of said session, a seed value is exchanged between the terminal 12,13 at which the key is stored and said node 5,8. The key and the seed value are used at both the terminal 12,13 and the node 5,8 to generate a pre-master key. The pre-master key becomes known to each of the terminals 12,13 involved in the IP session and to the network node 5,8. The pre-master key is used, directly or indirectly, to encrypt and decrypt traffic associated with said IP session.

    Abstract translation: 一种促进在两个或多个终端12,13之间合法拦截IP会话的方法,其中所述会话使用加密来保证业务。 所述方法包括:在终端12,13和网络中的节点5,8处,存储分配给所述终端12,13中的至少一个的密钥或至少一个用户的终端12,13中的一个 1,6通过其进行所述会话,或者耦合到该网络的节点。 在创建所述会话之前,在存储密钥的终端12,13和所述节点5,8之间交换种子值。 密钥和种子值都在终端12,13和节点5,8两端使用以产生预先主密钥。 对于IP会话中涉及的每个终端12,13和网络节点5,8,预先主密钥变得已知。 预主密钥直接或间接地用于加密和解密与所述IP会话相关联的流量。

Patent Agency Ranking