Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020091057 - INTEGRITY PROTECTION SCHEMES IN MOBILE COMMUNICATION

Publication Number WO/2020/091057
Publication Date 07.05.2020
International Application No. PCT/JP2019/043082
International Filing Date 01.11.2019
IPC
H04W 12/10 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
10Integrity
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
CPC
H04L 2209/80
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
80Wireless
H04L 63/123
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
123received data contents, e.g. message integrity
H04L 9/3242
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3242involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
H04W 12/1006
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
10Integrity
1006Packet or message integrity
Applicants
  • NEC CORPORATION [JP]/[JP]
Inventors
  • PRASAD, Anand Raghawa
  • DE KIEVIT, Sander
  • ITO, Hironori
  • YOSHIZAWA, Takahito
Agents
  • BABA, Motohiro
  • SAKAI, Hiromi
  • KATSURAGI, Yuji
  • KARAKAMA, Mutsumi
Priority Data
18204195.402.11.2018EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) INTEGRITY PROTECTION SCHEMES IN MOBILE COMMUNICATION
(FR) SCHÉMAS DE PROTECTION D'INTÉGRITÉ DANS DES COMMUNICATIONS MOBILES
Abstract
(EN)
This invention introduces methods and mechanisms of partial integrity protection in mobile systems. A device comprising: a memory configured to store instructions; and a processor configured to execute the instructions to: generate a representation value based on protocol data unit (PDU) header data and payload data of a PDU; generate a message authentication code based on the representation value; and include the message authentication code in the PDU.
(FR)
La présente invention introduit des procédés et des mécanismes de protection d'intégrité partielle dans des systèmes mobiles. Un dispositif comprend : une mémoire configurée pour stocker des instructions ; et un processeur configuré pour exécuter les instructions pour : générer une valeur de représentation sur la base de données d'en tête d'une unité de données de protocole (PDU) et de données de charge utile d'une PDU ; générer un code d'authentification de message sur la base de la valeur de représentation ; et inclure le code d'authentification de message dans la PDU.
Latest bibliographic data on file with the International Bureau