Processing

Please wait...

Settings

Settings

Goto Application

1. WO2014165747 - SECURING PEER-TO-PEER AND GROUP COMMUNICATIONS

Publication Number WO/2014/165747
Publication Date 09.10.2014
International Application No. PCT/US2014/032960
International Filing Date 04.04.2014
Chapter 2 Demand Filed 05.02.2015
IPC
H04W 12/04 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
04Key management
H04W 76/02 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
76Connection management
02Connection set-up
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
H04L 2209/80
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
80Wireless
H04L 2463/061
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2463Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
061applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
H04L 2463/062
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2463Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
062applying encryption of the keys
H04L 63/062
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
062for key distribution, e.g. centrally by trusted party
H04L 63/065
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
065for group communications
H04L 9/083
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
083involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
Applicants
  • INTERDIGITAL PATENT HOLDINGS, INC. [US]/[US]
Inventors
  • CHOYI, Vinod Kumar
  • KAUR, Samian
  • BRUSILOVSKY, Alec
  • SHAH, Yogendra, C.
Agents
  • SAMUELS, Steven, B.
Priority Data
61/809,06705.04.2013US
61/898,76301.11.2013US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURING PEER-TO-PEER AND GROUP COMMUNICATIONS
(FR) SÉCURISATION DE COMMUNICATIONS DE GROUPE ET DE POSTE-À-POSTE
Abstract
(EN)
Systems, methods and apparatus embodiments are described herein for leveraging security associations to enhance security of proximity services. Existing security associations are leveraged to create security associations that are used by proximity services. For example, existing keys may be leveraged to derive new keys that may be used to secure peer-to-peer communications.
(FR)
Selon des modes de réalisation, la présente invention concerne des systèmes, des procédés et un appareil permettant d'exploiter des associations de sécurité en vue d'améliorer la sécurité de services de proximité. Les associations de sécurité existantes sont exploitées pour créer des associations de sécurité qui sont utilisées par des services de proximité. Par exemple, des clés existantes peuvent être exploitées pour déduire de nouvelles clés qui peuvent être utilisées pour sécuriser des communications de poste-à-poste.
Latest bibliographic data on file with the International Bureau