Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
18. (GB2518257) Methods and systems for operating a secure mobile device

Office : United Kingdom
Application Number: 201409663 Application Date: 30.05.2014
Publication Number: 2518257 Publication Date: 16.07.2014
Publication Kind : A
IPC:
H04L 9/08
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9
Arrangements for secret or secure communication
06
the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
08
Key distribution
CPC:
H04L 63/04
G06F 9/4401
G06F 13/1689
G06F 13/28
G06F 13/4027
G06F 21/606
G06F 21/71
H04B 1/3816
H04L 9/0861
H04L 63/029
H04L 63/0428
H04L 63/0442
H04L 63/061
H04L 63/062
H04L 63/08
H04L 63/0823
H04L 63/0838
H04L 63/0869
H04L 63/0876
H04L 63/10
H04L 63/166
H04L 63/20
H04L 67/1095
H04L 67/125
H04L 67/42
H04L 2463/061
H04W 4/12
H04W 4/14
H04W 4/50
H04W 4/70
H04W 8/04
H04W 12/0027
H04W 12/02
H04W 12/04
H04W 12/04031
H04W 12/06
H04W 28/08
H04W 52/0229
H04W 80/06
H04W 88/02
H04W 88/06
Y02D 10/14
Y02D 10/151
Y02D 70/00
Y02D 70/1222
Y02D 70/1224
Y02D 70/1242
Y02D 70/1262
Y02D 70/142
Y02D 70/144
Y02D 70/146
Y02D 70/162
Y02D 70/166
Y02D 70/168
Y02D 70/21
Y02D 70/22
H04L 63/12
Applicants: VODAFONE IP LICENSING LTD
Inventors: BONE NICHOLAS
SNAPE TIM
PRABDIAL YAKEEN
BENTO JORGE
Priority Data: 201316370 13.09.2013 GB
201318339 16.10.2013 GB
Title: (EN) Methods and systems for operating a secure mobile device
Abstract:
(EN) The invention assumes a system wherein a key at a machine type communications (MTC) user equipment (UE) has been derived using generic bootstrapping architecture (GBA). In one claim this key is used to protect another key, preferably a public key, which is used to verify some protected data. In another claim one interface is used to derive the GBA key and another interface is used to transmit the GBA key or a key protected by the GBA key. In another claim two devices obtain two key data using GBA and a server respectively and then securely associate using the key data. In another claim a machine to machine (M2M) device derives a GBA key and uses it to verify received data.