Abstract:
This invention relates to a key generation and distribution method for an authentication framework for an operator provider network and a service provider network. The method comprises receiving a first request from a first requestor, the first requestor comprising an identity of the first requestor; generating a new identity (ID) based on the identity of the first requestor; generating a secret key based on an Identity Based Cryptography (IBC) key generation algorithm for the new ID with a predetermined pair of global keys, namely Global Secret Key (GSK) and Global Public Key (GPK); transmitting the new ID, secret key and the GPK to the first requestor; receiving a request from a second requestor, the request comprising a plurality of identities; generating an new ID for each of the plurality of identities; generating a secret key based on the IBC key generation algorithm for each of the plurality of new IDs; and transmitting the plurality of new IDs, secret keys corresponding to each of the plurality of IDs and the GPK to the second requestor.
Abstract:
This invention relates to a User Equipment (UE) for communicating directly with a core network comprising: a first communication device; a second communication device; an authentication management module; a processor; a storage medium; instructions stored on the storage medium and executable by the processor to: perform a first authentication with the core network to obtain a security context; transmit a security context from the authentication management module to at least one of the first and second communication devices (1220, 1230); and perform a second authentication for one of the first and second communication devices with the core network using the security context from the authentication management module to establish connection with the core network (1240).
Abstract:
Embodiments of the invention provide key generation and authentication methods that dynamically generate device credentials e.g. device key, at the core network during authentication procedure, and thereby eliminating the need to store device credentials, e.g. device key, at the core network. Particularly, at a core network node, e.g. HSS, upon receiving an authentication message which at least includes a device identifier and a service identifier, the core network node generates a device key based at least on the device identifier and a service key which is stored at the core network node and associated with the service identifier; and uses the generated device key to authenticate a device associated with the device identifier.
Abstract:
A method for devices without SIM card (SD) to communicate directly with a core network. The method may be performed in the following matter. The SD registers with the core network through a cellular device (MD) in order to obtain a credential for the SD. The credential comprises Access ID, key, and control parameters. The SD then performs a mutual authentication directly with the core network using the credential. If the SD authenticates successfully with the core network, the SD is granted access to the servers via the core network.
Abstract:
Embodiments of the invention provide methods and apparatuses for session key generation, which use Diffie-Hellman procedure in both user equipment and network to prevent an attacker from breaking the session key by simply listening to signal exchanges passively when the attacker possesses credentials of a USIM card.
Abstract:
This invention relates a system for managing and distributing of a blacklist of User Equipment ID (UE ID) in a network. The system comprises a number of groups of network,each of the groups of network comprise a blacklist server and a number of authentication servers. The system further comprises a Package Key Generator (PKG). The blacklist server is configured to: store a blacklist containing UE IDs that are not supposed to gain access to the network; transmit the blacklist to the plurality of authentication servers in the same group; receive a message; determine a content in the message is an order to add anew revoked UE ID in the blacklist; update the blacklist to include the new revoked UE ID;and send an update blacklist message to the plurality of authentication servers in the same group.
Abstract:
This invention relates a unified authentication method for a device to authenticate an operator provider network and a service provider network based on Identity-Based Cryptography where each of the device, operator provider network and service provider network has a different private key and a same Global Public Key (GPK) issued by a public key generator, the unified authentication method comprising: the device, generating and transmitting an authentication data package to the operator provider network, the authentication data package includes an Authentication Type (Auth. Type), and a Service Provider network's ID (SP_ID), wherein the Auth. Type comprises a first type where authentication involves an element of the operator provider network and an element of the service provider network, a second type where authentication involves the element of the operator provider network, and a third type where authentication involves the element of the service provider network; the element of the operator provider network, in response to receiving the authentication data package, determining a type of authentication based on the Authentication Type; the element of the operator provider network, in response to determining the first type of authentication, generating and transmitting a first Authentication Response Message to the device and transmitting the authentication data package to the element of the service provider network based on the SP_ID; and the element of the service provider network, in response to receiving the authentication data package, generating and transmitting a second Authentication Response Message to the device.
Abstract:
Embodiments of the invention relate to authentication of user equipment and core network with at least an asymmetric key in USIM/eUICC as authentication credentials to prevent man-in-the-middle attacks. Embodiments of the invention further relate to use of asymmetric key in combination with any of a symmetric key,another pair of asymmetric keys and Diffie-Hellman (DH) procedure in authentication and/or key generation procedure.