Processing

Please wait...

Settings

Settings

Goto Application

1. WO2015059286 - CONTROLLED CREDENTIALS PROVISIONING BETWEEN USER DEVICES

Publication Number WO/2015/059286
Publication Date 30.04.2015
International Application No. PCT/EP2014/072874
International Filing Date 24.10.2014
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/04 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
04Key management
H04L 9/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
08Key distribution
CPC
H04L 2209/80
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
80Wireless
H04L 63/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
H04L 63/0853
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0853using an additional device, e.g. smartcard, SIM or a different communication terminal
H04L 9/0861
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
H04L 9/088
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
H04W 12/0027
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
002Mobile device security; Mobile application security
0027Managing security policies for mobile device or applications control, e.g. mobile application permission management or mobile device security settings
Applicants
  • KONINKLIJKE KPN N.V. [NL]/[NL]
  • NEDERLANDSE ORGANISATIE VOOR TOEGEPAST-NATUURWETENSCHAPPELIJK ONDERZOEK TNO [NL]/[NL]
Inventors
  • DE KIEVIT, Sander
Agents
  • WUYTS, Koenraad
Priority Data
13190078.924.10.2013EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) CONTROLLED CREDENTIALS PROVISIONING BETWEEN USER DEVICES
(FR) FOURNITURE DE DONNÉES D'AUTHENTIFICATION COMMANDÉE ENTRE DISPOSITIFS UTILISATEUR
Abstract
(EN)
The disclosure relates a method for controlling, by a first user device, user data exchange of a second user device over a telecommunications network. The first user device obtains a set of credentials and at least a portion of the set of credentials is provided to the second user device to enable the second user device to exchange user date over the telecommunications network. The data exchange of the second user device over the telecommunications network is controlled by the first user device. The first user device may perform a control action with respect to the credentials obtained by the first user device and provided to the second device.
(FR)
La présente invention concerne un procédé de commande, par un premier dispositif utilisateur, des échanges de données utilisateur d'un second dispositif utilisateur sur un réseau de télécommunications. Le premier dispositif utilisateur obtient un ensemble de données d'authentification et au moins une partie des données d'authentification est fournie au second dispositif utilisateur pour permettre au second dispositif utilisateur d'échanger des données utilisateur sur le réseau de télécommunications. Les échanges de données du second dispositif utilisateur sur le réseau de télécommunications sont commandés par le premier dispositif utilisateur. Le premier dispositif utilisateur peut effectuer une action de commande relativement aux données d'authentification obtenues par le premier dispositif utilisateur et fournies au second dispositif.
Latest bibliographic data on file with the International Bureau