MY159749A - Systems and methods for securing network communications - Google Patents

Systems and methods for securing network communications

Info

Publication number
MY159749A
MY159749A MYPI2013003442A MYPI2013003442A MY159749A MY 159749 A MY159749 A MY 159749A MY PI2013003442 A MYPI2013003442 A MY PI2013003442A MY PI2013003442 A MYPI2013003442 A MY PI2013003442A MY 159749 A MY159749 A MY 159749A
Authority
MY
Malaysia
Prior art keywords
secure
service provider
establish
systems
methods
Prior art date
Application number
MYPI2013003442A
Inventor
Inhyok Cha
Louise J Guccione
Andreas Schmidt
Andreas Leicher
Yogendra C Shah
Original Assignee
Interdigital Patent Holdings Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Patent Holdings Inc filed Critical Interdigital Patent Holdings Inc
Publication of MY159749A publication Critical patent/MY159749A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

SECURE COMMUNICATIONS MAY BE ESTABLISHED AMONGST NETWORK ENTITIES FOR PERFORMING AUTHENTICATION AND/OR VERIFICATION OF THE NETWORK ENTITIES. FOR EXAMPLE, A USER EQUIPMENT (UE) (102) MAY ESTABLISH A SECURE CHANNEL WITH AN IDENTITY PROVIDER, CAPABLE OF ISSUING USER IDENTITIES FOR AUTHENTICATION OF THE USER/UE (102). THE UE (102) MAY ALSO ESTABLISH A SECURE CHANNEL WITH A SERVICE PROVIDER, CAPABLE OF PROVIDING SERVICES TO THE UE (102) VIA A NETWORK. THE IDENTITY PROVIDER MAY EVEN ESTABLISH A SECURE CHANNEL WITH THE SERVICE PROVIDER FOR PERFORMING SECURE COMMUNICATIONS. THE ESTABLISHMENT OF EACH OF THESE SECURE CHANNELS MAY ENABLE EACH NETWORK ENTITY TO AUTHENTICATE TO THE OTHER NETWORK ENTITIES. THE SECURE CHANNELS MAY ALSO ENABLE THE UE (102) TO VERIFY THAT THE SERVICE PROVIDER WITH WHICH IT HAS ESTABLISHED THE SECURE CHANNEL IS AN INTENDED SERVICE PROVIDER FOR ACCESSING SERVICES.
MYPI2013003442A 2011-03-23 2012-03-23 Systems and methods for securing network communications MY159749A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161466662P 2011-03-23 2011-03-23
US201161466852P 2011-03-23 2011-03-23
US201161525575P 2011-08-19 2011-08-19

Publications (1)

Publication Number Publication Date
MY159749A true MY159749A (en) 2017-01-31

Family

ID=45937636

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2013003442A MY159749A (en) 2011-03-23 2012-03-23 Systems and methods for securing network communications

Country Status (9)

Country Link
US (2) US8850545B2 (en)
EP (2) EP2689599B1 (en)
JP (3) JP5865992B2 (en)
KR (2) KR20140037276A (en)
CN (1) CN103460738B (en)
IL (1) IL228553A (en)
MY (1) MY159749A (en)
TW (2) TW201628371A (en)
WO (1) WO2012129503A1 (en)

Families Citing this family (89)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012005739A1 (en) * 2010-07-09 2012-01-12 Hewlett-Packard Development Company, L.P. Responses to server challenges included in a hypertext transfer protocol header
US8893261B2 (en) 2011-11-22 2014-11-18 Vmware, Inc. Method and system for VPN isolation using network namespaces
US10433161B2 (en) * 2012-01-30 2019-10-01 Telefonaktiebolaget Lm Ericsson (Publ) Call handover between cellular communication system nodes that support different security contexts
US20130305378A1 (en) * 2012-05-09 2013-11-14 Visa Europe Limited Method and system for establishing trust between a service provider and a client of the service provider
US8938613B2 (en) * 2012-05-31 2015-01-20 Novell, Inc. Techniques for secure message offloading
KR20130143263A (en) * 2012-06-21 2013-12-31 에스케이플래닛 주식회사 Method for authentication users using open id based on trusted platform, apparatus and system for the same
US8971851B2 (en) * 2012-06-28 2015-03-03 Certicom Corp. Key agreement for wireless communication
US9166958B2 (en) * 2012-07-17 2015-10-20 Texas Instruments Incorporated ID-based control unit-key fob pairing
US8745718B1 (en) * 2012-08-20 2014-06-03 Jericho Systems Corporation Delivery of authentication information to a RESTful service using token validation scheme
JP5862540B2 (en) * 2012-10-26 2016-02-16 ソニー株式会社 Information processing apparatus, information storage apparatus, information processing system, information processing method, and program
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9367676B2 (en) 2013-03-22 2016-06-14 Nok Nok Labs, Inc. System and method for confirming location using supplemental sensor and/or location data
US11570161B2 (en) 2013-07-31 2023-01-31 Nec Corporation Devices and method for MTC group key management
US10148629B1 (en) * 2013-09-23 2018-12-04 Amazon Technologies, Inc. User-friendly multifactor authentication
EP2854331A1 (en) * 2013-09-30 2015-04-01 Siemens Aktiengesellschaft Method and System for Authenticating a User of a Device
CN103475491B (en) * 2013-10-10 2017-01-04 杭州东信北邮信息技术有限公司 A kind of remote maintenance system logged in without cryptosecurity and implementation method
US20150172324A1 (en) * 2013-12-13 2015-06-18 Alcatel-Lucent Usa Inc. Authorized SIP Redirection
CN104765999B (en) * 2014-01-07 2020-06-30 腾讯科技(深圳)有限公司 Method, terminal and server for processing user resource information
US10395024B2 (en) * 2014-03-04 2019-08-27 Adobe Inc. Authentication for online content using an access token
US9954679B2 (en) 2014-03-05 2018-04-24 Qualcomm Incorporated Using end-user federated login to detect a breach in a key exchange encrypted channel
CN105338511B (en) * 2014-06-25 2019-08-16 华为技术有限公司 Network topology hidden method and equipment
US9258117B1 (en) * 2014-06-26 2016-02-09 Amazon Technologies, Inc. Mutual authentication with symmetric secrets and signatures
US9883384B2 (en) * 2014-07-16 2018-01-30 Qualcomm Incorporated UE-based network subscription management
US9749131B2 (en) * 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
US9806887B1 (en) * 2014-09-23 2017-10-31 Amazon Technologies, Inc. Authenticating nonces prior to encrypting and decrypting cryptographic keys
US9998449B2 (en) * 2014-09-26 2018-06-12 Qualcomm Incorporated On-demand serving network authentication
US9491618B2 (en) * 2014-09-26 2016-11-08 Qualcomm Incorporated Serving network authentication
KR102021213B1 (en) * 2014-10-31 2019-09-11 콘비다 와이어리스, 엘엘씨 End-to-end service layer authentication
US9628455B2 (en) * 2014-12-09 2017-04-18 Akamai Technologies, Inc. Filtering TLS connection requests using TLS extension and federated TLS tickets
MX2017008608A (en) * 2014-12-31 2018-03-23 Imageware Systems Inc Cloud-based biometric enrollment, identification and verification through identity providers.
CN107018676B (en) * 2015-01-09 2021-06-25 三星电子株式会社 Mutual authentication between user equipment and evolved packet core
KR102033465B1 (en) 2015-02-27 2019-10-17 텔레호낙티에볼라게트 엘엠 에릭슨(피유비엘) Security equipment in communication between communication devices and network devices
US9998287B2 (en) * 2015-03-06 2018-06-12 Comcast Cable Communications, Llc Secure authentication of remote equipment
JP2018518854A (en) 2015-03-16 2018-07-12 コンヴィーダ ワイヤレス, エルエルシー End-to-end authentication at the service layer using a public key mechanism
US10122692B2 (en) 2015-06-16 2018-11-06 Amazon Technologies, Inc. Handshake offload
US10122689B2 (en) 2015-06-16 2018-11-06 Amazon Technologies, Inc. Load balancing with handshake offload
FR3038413A1 (en) * 2015-07-03 2017-01-06 Orange METHOD FOR MANAGING THE AUTHENTICATION OF A CLIENT IN A COMPUTER SYSTEM
CN106452814B (en) * 2015-08-10 2019-11-26 阿里巴巴集团控股有限公司 A kind of method and apparatus using external account operating resource
US9883385B2 (en) * 2015-09-15 2018-01-30 Qualcomm Incorporated Apparatus and method for mobility procedure involving mobility management entity relocation
SG10201509342WA (en) * 2015-11-12 2017-06-29 Huawei Int Pte Ltd Method and system for session key generation with diffie-hellman procedure
FR3046000B1 (en) * 2015-12-21 2018-02-16 Oberthur Technologies METHOD FOR RECEIVING DATA WITHIN AN ELECTRONIC ENTITY AND ELECTRONIC ENTITY THEREFOR
US20190020643A1 (en) * 2016-02-12 2019-01-17 Telefonaktiebolaget Lm Ericsson (Publ) Securing an interface and a process for establishing a secure communication link
CN107220260B (en) * 2016-03-22 2020-07-24 阿里巴巴集团控股有限公司 Page display method and device
US20170289120A1 (en) * 2016-04-04 2017-10-05 Mastercard International Incorporated Systems and methods for authenticating user for secure data access using multi-party authentication system
EP3465978B1 (en) * 2016-05-30 2021-07-07 Telecom Italia S.p.A. Protection of privacy in wireless telecommunication networks
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
CN107689944A (en) * 2016-08-05 2018-02-13 阿里巴巴集团控股有限公司 Identity identifying method, device and system
US10924467B2 (en) 2016-11-04 2021-02-16 Microsoft Technology Licensing, Llc Delegated authorization for isolated collections
US10514854B2 (en) * 2016-11-04 2019-12-24 Microsoft Technology Licensing, Llc Conditional authorization for isolated collections
CA3051500C (en) 2017-01-26 2022-08-23 Walmart Apollo, Llc Cloud security stack
DE102017000768A1 (en) 2017-01-27 2018-08-02 Giesecke+Devrient Mobile Security Gmbh Method for performing two-factor authentication
US10841084B2 (en) * 2017-02-03 2020-11-17 Qualcomm Incorporated Session management authorization token
US11290466B2 (en) * 2017-08-16 2022-03-29 Cable Television Laboratories, Inc. Systems and methods for network access granting
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
KR102309044B1 (en) * 2017-12-01 2021-10-05 삼성에스디에스 주식회사 Apparatus and method for establishing secure channel in message processing system
US10581948B2 (en) 2017-12-07 2020-03-03 Akamai Technologies, Inc. Client side cache visibility with TLS session tickets
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US10778415B2 (en) * 2018-01-19 2020-09-15 Cox Communications, Inc. Systems and methods for disabling physical modules in network switches using encryption
US10972455B2 (en) * 2018-04-24 2021-04-06 International Business Machines Corporation Secure authentication in TLS sessions
CN108833943B (en) * 2018-04-24 2020-12-08 苏州科达科技股份有限公司 Code stream encryption negotiation method and device and conference terminal
CN112041838B (en) 2018-04-30 2024-07-23 谷歌有限责任公司 Safe Zone Interaction
WO2019212579A1 (en) 2018-04-30 2019-11-07 Google Llc Managing enclave creation through a uniform enclave interface
US10819695B2 (en) * 2018-05-25 2020-10-27 Citrix Systems, Inc. Electronic device including local identity provider server for single sign on and related methods
US11303632B1 (en) * 2018-06-08 2022-04-12 Wells Fargo Bank, N.A. Two-way authentication system and method
CN109088890A (en) * 2018-10-18 2018-12-25 国网电子商务有限公司 A kind of identity identifying method, relevant apparatus and system
WO2020094475A1 (en) * 2018-11-05 2020-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Authentication and key agreement for a terminal device
US11381595B2 (en) * 2018-11-09 2022-07-05 International Business Machines Corporation Transport layer security session man-in-the-middle attack prevention
US11019034B2 (en) 2018-11-16 2021-05-25 Akamai Technologies, Inc. Systems and methods for proxying encrypted traffic to protect origin servers from internet threats
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US10820201B1 (en) * 2019-05-17 2020-10-27 Cisco Technology, Inc. Providing secure access for automatically on-boarded subscribers in Wi-Fi networks
US20200366476A1 (en) * 2019-05-17 2020-11-19 Panasonic Avionics Corporation Transient key negotiation for passenger accessible peripherals
US11265345B2 (en) 2019-08-06 2022-03-01 Red Hat, Inc. Server detection of leaked credentials over HTTP
CN111031074B (en) * 2020-01-09 2022-03-01 中国信息通信研究院 Authentication method, server and client
TWI778319B (en) * 2020-01-10 2022-09-21 玉山商業銀行股份有限公司 Method for cross-platform authorizing access to resources and authorization system thereof
CN114946153A (en) * 2020-01-16 2022-08-26 中兴通讯股份有限公司 Method, device and system for application key generation and management in a communication network in encrypted communication with a service application
EP4107904A4 (en) * 2020-02-19 2023-08-02 Samsung Electronics Co., Ltd. APPARATUS AND METHOD FOR GENERATING APPLICATION SPECIFIC KEYS USING A KEY DERIVED FROM NETWORK ACCESS AUTHENTICATION
CN113518312B (en) * 2020-03-27 2022-11-11 华为技术有限公司 Communication method, device and system
US11991292B2 (en) * 2020-04-03 2024-05-21 Mastercard International Incorporated Systems and methods for use in appending log entries to data structures
CN113852958A (en) * 2020-06-28 2021-12-28 中兴通讯股份有限公司 5G authentication method, 5G automatic account opening method, device, system and storage medium
TWI735332B (en) * 2020-09-08 2021-08-01 四零四科技股份有限公司 Certificate transfer system and certificate transfer method
CN112261011B (en) * 2020-09-30 2023-06-16 上海仲速网络科技股份有限公司 Cloud desktop authentication method based on two-dimensional code recognition
EP4054144A1 (en) * 2021-03-03 2022-09-07 ise Individuelle Software und Elektronik GmbH Method and system for secure data transmission
US11902775B2 (en) * 2021-05-28 2024-02-13 Cisco Technology, Inc. Encrypted nonces as rotated device addresses
US11924190B2 (en) 2021-08-17 2024-03-05 Cisco Technology, Inc. Service assurance via federation-based network during roaming
US11941266B2 (en) 2021-10-20 2024-03-26 Samsung Electronics Co., Ltd. Resource isolation in computational storage devices
CN116055254B (en) * 2023-01-10 2024-06-18 华中科技大学 Safe and trusted gateway system, control method, medium, equipment and terminal
CN117641339B (en) * 2024-01-18 2024-04-09 中国电子科技集团公司第三十研究所 System and method for fast application layer authentication and key agreement

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4812168B2 (en) 1999-02-15 2011-11-09 ヒューレット・パッカード・カンパニー Trusted computing platform
JP4130809B2 (en) * 2003-11-04 2008-08-06 エヌ・ティ・ティ・コミュニケーションズ株式会社 Method for constructing encrypted communication channel between terminals, apparatus and program therefor
GB2377137B (en) 2001-06-27 2004-10-20 Hewlett Packard Co Network appliances
AU2003212638A1 (en) * 2002-03-13 2003-09-22 Adjungo Networks Ltd. Accessing cellular networks from non-native local networks
DE60314871T2 (en) * 2002-05-24 2008-03-13 Telefonaktiebolaget Lm Ericsson (Publ) METHOD FOR AUTHENTICATING A USER IN ACCESS TO A SERVICE PROVIDER'S SERVICE
US7529933B2 (en) * 2002-05-30 2009-05-05 Microsoft Corporation TLS tunneling
BRPI0313412B1 (en) * 2002-08-14 2017-03-21 Thomson Licensing Sa wireless public lan session key management supporting multiple virtual operators
US7908484B2 (en) * 2003-08-22 2011-03-15 Nokia Corporation Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack
US8185433B2 (en) * 2004-07-02 2012-05-22 Summer Robert D Peer-to-peer affinity-group commerce method and system
JP2006050535A (en) * 2004-07-07 2006-02-16 Ricoh Co Ltd Scanner device, information processing apparatus, image data encryption method, image data display method, image data encryption program and image data display program
US20060020791A1 (en) * 2004-07-22 2006-01-26 Pekka Laitinen Entity for use in a generic authentication architecture
CN101156412B (en) * 2005-02-11 2011-02-09 诺基亚公司 Method and apparatus for providing a bootstrap procedure in a communication network
WO2006085207A1 (en) * 2005-02-11 2006-08-17 Nokia Corporation Method and apparatus for providing bootstrapping procedures in a communication network
US7877787B2 (en) * 2005-02-14 2011-01-25 Nokia Corporation Method and apparatus for optimal transfer of data in a wireless communications system
US7628322B2 (en) * 2005-03-07 2009-12-08 Nokia Corporation Methods, system and mobile device capable of enabling credit card personalization using a wireless network
US20060236116A1 (en) * 2005-04-18 2006-10-19 Lucent Technologies, Inc. Provisioning root keys
DE102005026982A1 (en) * 2005-06-10 2006-12-14 Siemens Ag Method for agreeing a security key between at least one first and a second communication subscriber for securing a communication connection
WO2006137624A1 (en) * 2005-06-22 2006-12-28 Electronics And Telecommunications Research Institute Method for allocating authorization key identifier for wireless portable internet system
US20070101122A1 (en) * 2005-09-23 2007-05-03 Yile Guo Method and apparatus for securely generating application session keys
EP1955511B1 (en) * 2005-11-30 2015-02-25 Telecom Italia S.p.A. Method and system for automated and secure provisioning of service access credentials for on-line services
CN101022651B (en) * 2006-02-13 2012-05-02 华为技术有限公司 Combined right-discriminating construction and realizing method thereof
US20080132931A1 (en) * 2006-12-04 2008-06-05 Gregory Paul Mueller Skin puncturing device
KR101084938B1 (en) * 2007-10-05 2011-11-18 인터디지탈 테크날러지 코포레이션 Technology for secure channelization between WIC and terminal
WO2009106091A1 (en) * 2008-02-25 2009-09-03 Nokia Siemens Networks Oy Secure bootstrapping architecture method based on password-based digest authentication
EP2283430B1 (en) * 2008-05-23 2018-08-01 Telefonaktiebolaget LM Ericsson (publ) Ims user equipment, control method thereof, host device, and control method thereof
JP2009290329A (en) * 2008-05-27 2009-12-10 Toshiba Corp Ip communication system, server unit, terminal device and authentication method
US20130125222A1 (en) 2008-08-19 2013-05-16 James D. Pravetz System and Method for Vetting Service Providers Within a Secure User Interface
US8316091B2 (en) * 2008-12-01 2012-11-20 At&T Mobility Ii Llc Content management for wireless digital media frames
WO2011048551A1 (en) * 2009-10-19 2011-04-28 Nokia Corporation User identity management for permitting interworking of a bootstrapping architecture and a shared identity service
CN101707594A (en) * 2009-10-21 2010-05-12 南京邮电大学 Single sign on based grid authentication trust model
US8977853B2 (en) * 2010-01-06 2015-03-10 Telcordia Technologies, Inc. System and method establishing trusted relationships to enable secure exchange of private information
US9450928B2 (en) * 2010-06-10 2016-09-20 Gemalto Sa Secure registration of group of clients using single registration procedure
US9578041B2 (en) * 2010-10-25 2017-02-21 Nokia Technologies Oy Verification of peer-to-peer multimedia content
US8914876B2 (en) * 2011-05-05 2014-12-16 Ebay Inc. System and method for transaction security enhancement
US9418216B2 (en) * 2011-07-21 2016-08-16 Microsoft Technology Licensing, Llc Cloud service authentication
US8898751B2 (en) * 2011-10-24 2014-11-25 Verizon Patent And Licensing Inc. Systems and methods for authorizing third-party authentication to a service
US20130238461A1 (en) * 2012-03-06 2013-09-12 Richard Theodore Tieken Methods and systems for matching consumers with providers

Also Published As

Publication number Publication date
US20140365777A1 (en) 2014-12-11
JP5865992B2 (en) 2016-02-17
CN103460738A (en) 2013-12-18
EP3217696A1 (en) 2017-09-13
KR101580379B1 (en) 2015-12-23
IL228553A0 (en) 2013-12-31
JP6224688B2 (en) 2017-11-01
CN103460738B (en) 2018-06-01
KR20140002770A (en) 2014-01-08
WO2012129503A1 (en) 2012-09-27
EP2689599A1 (en) 2014-01-29
EP2689599B1 (en) 2017-05-03
TWI538463B (en) 2016-06-11
JP2015180092A (en) 2015-10-08
US8850545B2 (en) 2014-09-30
IL228553A (en) 2017-07-31
JP6318116B2 (en) 2018-04-25
JP2014515207A (en) 2014-06-26
KR20140037276A (en) 2014-03-26
US20130080769A1 (en) 2013-03-28
JP2016067056A (en) 2016-04-28
TW201628371A (en) 2016-08-01
TW201246890A (en) 2012-11-16

Similar Documents

Publication Publication Date Title
MY159749A (en) Systems and methods for securing network communications
WO2013106688A3 (en) Authenticating cloud computing enabling secure services
BR112012028066A2 (en) handset and methods to authenticate wireless network
WO2012170227A3 (en) System and method for authenticating a user
MX340495B (en) Social hotspot.
NO20090934L (en) Procedure and computer program for multi-channel one-time password verification between server and mobile device
SG10201901366WA (en) Key exchange through partially trusted third party
MY172715A (en) System and method enabling multiparty and multi level authorizations for accessing confidential information
GB2523710A (en) Multi-factor authentication and comprehensive login system for client-server networks
PH12012502330A1 (en) Method and apparatus for binding subscriber authentication and device authentication in communication systems
FI20115313A0 (en) Authentication method and system
GB2506066A (en) Zero sign-on authentication
CU20170034A7 (en) METHODS AND DEVICE FOR THE RE-AUTHENTICATION ON DEMAND OF A SEVICE NETWORK BY A USER TEAM (EU)
WO2014138430A3 (en) Secure simple enrollment
WO2010063091A3 (en) System and methods for online authentication
WO2009002705A3 (en) Device provisioning and domain join emulation over non-secured networks
WO2015179849A3 (en) Network authentication system with dynamic key generation
WO2014191768A3 (en) Multi-factor zero-knowledge authentication using pairings
PH12018500982A1 (en) Support of emergency services over wlan access to 3gpp evolved packet core for unauthenticated users
WO2012040324A3 (en) Shared secret establishment and distribution
WO2011133988A3 (en) Identity verification system using network initiated ussd
SA114350627B1 (en) Key agreement protocol
NZ722177A (en) System and method for communicating credentials
WO2012094399A3 (en) Method and system for out-of-band delivery of wireless network credentials
ATE531184T1 (en) IPTV SECURITY IN A COMMUNICATIONS NETWORK
OSZAR »