Processing

Please wait...

PATENTSCOPE will be unavailable a few hours for maintenance reason on Saturday 31.10.2020 at 7:00 AM CET
Settings

Settings

Goto Application

1. WO2012061604 - SYSTEM AND METHOD FOR SECURING WIRELESS COMMUNICATIONS

Publication Number WO/2012/061604
Publication Date 10.05.2012
International Application No. PCT/US2011/059161
International Filing Date 03.11.2011
IPC
H04L 9/30 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
28using particular encryption algorithm
30Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
CPC
H04L 25/0228
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
25Baseband systems
02Details
0202Channel estimation
0224using sounding signals
0228with direct estimation from sounding signals
H04L 63/061
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
061for key exchange, e.g. in peer-to-peer networks
H04L 63/1475
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
H04L 9/0875
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
0875based on channel impulse response [CIR]
H04W 12/00504
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
005Context aware security
00504Ambient aware, e.g. using captured environmental data
H04W 12/0401
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0401Key generation or derivation
Applicants
  • HUAWEI TECHNOLOGIES CO., LTD. [CN]/[CN] (AllExceptUS)
  • LY, Hung D. [VN]/[US] (UsOnly)
  • BLANKENSHIP, Yufei [US]/[US] (UsOnly)
  • LIU, Tie [CN]/[US] (UsOnly)
Inventors
  • LY, Hung D.
  • BLANKENSHIP, Yufei
  • LIU, Tie
Agents
  • CARLSON, Brian A.
Priority Data
12/938,84103.11.2010US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEM AND METHOD FOR SECURING WIRELESS COMMUNICATIONS
(FR) SYSTÈME ET PROCÉDÉ PERMETTANT DE SÉCURISER DES COMMUNICATIONS SANS FIL
Abstract
(EN)
A method for secure communications by a first user includes estimating a channel between the first user and a second user based on a pilot signal transmitted by the second user (block 607), determining a first threshold and a second threshold based on the estimate of channel (block 609), selecting a first subset of channel estimates, signaling the first subset of channel estimates to the second user (block 613), receiving a second subset of channel estimates from the second user (block 615), for each channel estimate in the second subset of channel estimates, quantizing the channel estimate based on a relationship between a gain of the channel estimate and the first threshold and the second threshold (block 625), generating a first secret key based on quantized channel estimates (block 627), verifying that the first secret key matches a second secret key generated by the second user (block 631), and transmitting information to the second user.
(FR)
Le procédé selon l'invention permettant de sécuriser les communications d'un premier utilisateur consiste à estimer un canal entre le premier utilisateur et un deuxième utilisateur en fonction d'un signal pilote transmis par le deuxième utilisateur (bloc 607), déterminer un premier seuil et un deuxième seuil sur la base de l'estimation de canal (bloc 609), sélectionner un premier sous-ensemble d'estimations de canal, signaler le premier sous-ensemble d'estimations de canal au deuxième utilisateur (bloc 613), recevoir un deuxième sous-ensemble d'estimations de canal à partir du deuxième utilisateur (bloc 615), pour chaque estimation de canal dans le deuxième sous-ensemble d'estimations de canal, quantifier l'estimation de canal en fonction d'une relation entre un gain de l'estimation de canal et le premier seuil et le deuxième seuil (bloc 625), générer une première clé secrète sur la base des estimations de canal quantifiées (bloc 627), vérifier que la première clé secrète correspond à une deuxième clé secrète générée par le deuxième utilisateur (bloc 631) et transmettre les informations au deuxième utilisateur.
Latest bibliographic data on file with the International Bureau