会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 13. 发明申请
    • LAWFUL INTERCEPTION OF ENCRYPTED COMMUNICATIONS
    • 严格界定加密通信
    • WO2013117243A1
    • 2013-08-15
    • PCT/EP2012/057788
    • 2012-04-27
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)NÄSLUND, MatsIOVIENO, MaurizioNORRMAN, Karl
    • NÄSLUND, MatsIOVIENO, MaurizioNORRMAN, Karl
    • H04L29/06
    • H04L63/0807H04L9/3213H04L63/0428H04L63/062H04L63/306
    • A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function stores cryptographic information used to encrypt the communication at a database. The cryptographic information is associated with an identifier used to identify the encrypted communication between the sending node and the receiving node. The KMS receives a request for Lawful Interception, the request including an identity of a Lawful Interception target. The KMS uses the target identity to determine the identifier, and retrieves the cryptographic information associated with the identifier from the database. The cryptographic information can be used to decrypt the encrypted communication. The KMS then sends either information derived from the cryptographic information or a decrypted communication towards the LEA. This allows the LEA to obtain a decrypted version of the communication.
    • 一种用于向执法机构(LEA)提供对发送节点和接收节点之间的加密通信的访问的方法和装置。 密钥管理服务器(KMS)功能存储用于加密数据库中的通信的加密信息。 加密信息与用于识别发送节点和接收节点之间的加密通信的标识符相关联。 KMS收到合法侦听请求,该请求包括合法拦截目标的身份。 KMS使用目标身份确定标识符,并从数据库检索与标识符相关联的加密信息。 加密信息可用于解密加密通信。 然后,KMS将从加密信息或解密的通信导出的信息发送给LEA。 这允许LEA获得通信的解密版本。
    • 15. 发明申请
    • TRUST DISCOVERY IN A COMMUNICATIONS NETWORK
    • 通信网络中的信任发现
    • WO2011099904A1
    • 2011-08-18
    • PCT/SE2010/050167
    • 2010-02-12
    • TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)HADDAD, WassimBLOM, RolfNÄSLUND, Mats
    • HADDAD, WassimBLOM, RolfNÄSLUND, Mats
    • H04L29/06H04W12/06
    • H04W12/06H04L63/08H04L63/0823
    • A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data.
    • 一种在通信网络中的两个节点之间建立信任的方法和装置。 第一节点从网络节点接收对第一节点唯一的认证数据,其可以用于导出用于第一节点的验证数据的紧凑表示。 第一个节点还接收到网络中所有节点的验证数据的认证紧凑表示。 第一节点从节点的认证数据中导出信任信息,并向第二节点发送包含信任信息和认证数据的一部分的消息。 第二节点具有网络中所有节点的验证数据的经认证的紧凑表示的副本,并使用网络中所有节点的验证数据的紧密表示和接收到的信任来验证来自第一节点的消息的真实性 信息和认证数据。
    • 16. 发明申请
    • IP MULTIMEDIA SECURITY
    • IP多媒体安全
    • WO2010099823A1
    • 2010-09-10
    • PCT/EP2009/052560
    • 2009-03-04
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)NÄSLUND, MatsBLOM, RolfCHENG, YiLINDHOLM, FredrikNORRMAN, Karl
    • NÄSLUND, MatsBLOM, RolfCHENG, YiLINDHOLM, FredrikNORRMAN, Karl
    • H04L29/06H04W12/04
    • H04L63/06H04L9/0844H04L2209/80H04W12/04
    • A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second media plane network nodes. The method comprises sending session set-up signalling from said first end point towards said second end point, said session set-up signalling including a session key generated by said first end point. The set-up signalling is intercepted at a first signalling plane network node and a determination made as to whether or not a signalling plane key has already been established for securing the signalling plane between said first end point and said first signalling plane network node. If a signalling plane key has already been established, then a media plane key is derived from that signalling plane key, and the media plane key sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node. If a signalling plane key has not already been established, then an alternative media plane key is derived from said session key and sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node.
    • 一种建立用于经由相应的第一和第二媒体平面网络节点至少部分地保护在第一和第二终端用户之间交换的媒体平面数据的密钥的方法。 该方法包括从所述第一端点向所述第二端点发送会话建立信令,所述会话建立信令包括由所述第一端点产生的会话密钥。 建立信令在第一信令平面网络节点被拦截,并且确定信令平面密钥是否已被建立用于在所述第一终端和所述第一信令平面网络节点之间保护信令平面。 如果已经建立了信令平面密钥,则从该信令平面密钥导出媒体平面密钥,并且将媒体平面密钥发送到所述第一媒体平面网络节点,以将介质平面固定在所述第一终端用户和所述第一媒体之间 平面网络节点。 如果还没有建立信令平面密钥,则从所述会话密钥导出替代媒体平面密钥,并将其发送到所述第一媒体平面网络节点,以便在所述第一终端用户和所述第一媒体平面网络节点之间保护媒体平面。
    • 18. 发明申请
    • KEY MANAGEMENT FOR NETWORK ELEMENTS
    • 网络元素的关键管理
    • WO2005078988A1
    • 2005-08-25
    • PCT/SE2004/000179
    • 2004-02-11
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)BLOM, RolfNÄSLUND, MatsCARRARA, ElisabettaLINDHOLM, FredrikNORRMAN, Karl
    • BLOM, RolfNÄSLUND, MatsCARRARA, ElisabettaLINDHOLM, FredrikNORRMAN, Karl
    • H04L9/00
    • H04L9/0844H04L9/0891H04L2209/80
    • The invention provides an establishment of a secret session key shared Between two network elements (NEa, NEb) belonging to different network domains (NDa, NDb). A first network element (NEa) of a first network domain (NDa) requests security parameters from an associated key management center (KMC) (AAAa). Upon reception of the request, the KMC (AAAa) generates a freshness token (FRESH) and calculates the session key (K) based on this token (FRESH) and a master key (KAB) shared with a second network domain (NDb). The security parameters are (securely) provided to the network element (NEa), which extracts the session key (K) and forwards the freshness token (FRESH) to the KMC (AAAb) of the second domain (NDb) through a second network element (NEb). Based on the token (FRESH) and the shared master key (KAB), the KMC (AAAb) generates a copy of the session key (K), which is (securely) provided to the second network element (NEb). The two network elements (NEa, NEb) now have shares the session key (K), enabling them to securely communicate with each other.
    • 本发明提供了属于不同网络域(NDa,NDb)的两个网元(NEa,NEb)之间共享的秘密会话密钥的建立。 第一网络域(NDa)的第一网元(NEa)从相关联的密钥管理中心(AAAa)请求安全参数。 在接收到请求时,KMC(AAAa)生成新鲜令牌(FRESH),并且基于该令牌(FRESH)和与第二网络域(NDb)共享的主密钥(KAB)来计算会话密钥(K)。 安全参数(安全地)被提供给提取会话密钥(K)的网元(NEa),并通过第二网络元件将新鲜度令牌(FRESH)转发到第二域(NDb)的KMC(AAAb) (鼻)。 基于令牌(FRESH)和共享主密钥(KAB),KMC(AAAb)生成(安全地)提供给第二网元(NEb)的会话密钥(K)的副本。 两个网元(NEa,NEb)现在已经共享了会话密钥(K),使得它们能够彼此安全地通信。
    • 19. 发明申请
    • CRYPTOGRAPHIC KEY MANAGEMENT IN COMMUNICATION NETWORKS
    • 通信网络中的密码密钥管理
    • WO2008048179A2
    • 2008-04-24
    • PCT/SE2007/050734
    • 2007-10-11
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)BLOM, RolfNÄSLUND, MatsNORRMAN, Karl
    • BLOM, RolfNÄSLUND, MatsNORRMAN, Karl
    • H04L9/08
    • H04L9/321H04L63/062H04L63/08H04L2209/80H04L2463/061H04W12/04H04W12/06H04W36/0038
    • An authentication server and a system and method for managing cryptographic keys across different combinations of user terminals, access networks, and core networks. A Transformation Coder Entity, TCE, (25) creates a master key, Mk, which is used to derive keys during the authentication procedure. During handover between the different access types, the Mk or a transformed Mk is passed between two authenticator nodes (42, 43, 44) that hold the key in the respective access networks when a User Equipment, UE, terminal (41, 51, 52, 53) changes access. The transformation of the Mk is performed via a one-way function, and has the effect that if the Mk is somehow compromised, it is not possible to automatically obtain access to previously used master keys. The transformation is performed based on the type of authenticator node and type of UE/identity module with which the transformed key is to be utilized. The Mk is never used directly, but is only used to derive the keys that are directly used to protect the access link.
    • 一种认证服务器以及一种用于管理用户终端,接入网络和核心网络的不同组合上的密钥的系统和方法。 转换编码器实体TCE(25)创建主密钥Mk,该密钥用于在认证过程中导出密钥。 在不同接入类型之间的切换期间,当用户设备UE终端(41,51,52)在两个认证者节点(42,43,44)之间传递Mk或变换后的Mk时, ,53)改变访问权限。 Mk的变换通过单向函数执行,并且具有如果Mk以某种方式被破坏的效果,则不可能自动获得对以前使用的主密钥的访问。 该转换基于认证器节点的类型以及将要使用变换的密钥的UE /身份模块的类型来执行。 Mk从不直接使用,但仅用于派生直接用于保护访问链接的密钥。