Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020109624 - KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORK

Publication Number WO/2020/109624
Publication Date 04.06.2020
International Application No. PCT/EP2019/083315
International Filing Date 02.12.2019
IPC
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/04 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
04Key management
CPC
H04W 12/001
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
001Protecting confidentiality, e.g. by encryption or ciphering
H04W 12/04031
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0403using a trusted network node as anchor
04031Key distribution, e.g. key pre-distribution or key agreement
H04W 12/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
06Authentication
Applicants
  • NAGRAVISION S.A. [CH]/[CH]
Inventors
  • FISCHER, Jean-Bernard
  • THOMAS, Frederic
  • GREMAUD, Fabien
Agents
  • HOYNG ROKH MONEGIER LLP
Priority Data
18209647.930.11.2018EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) KEY NEGOTIATION AND PROVISIONING FOR DEVICES IN A NETWORK
(FR) NÉGOCIATION ET FOURNITURE DE CLÉ POUR DES DISPOSITIFS DANS UN RÉSEAU
Abstract
(EN)
The present disclosure proposes method and systems for establishing secure communication session (s) between a first device and a second device, where the first device operates in a user network and implements a first key exchange protocol for secure communication. The second device is capable of communicating with the first device over a wireless communication network. The second device implements a second key exchange protocol that is different to the first key exchange protocol for secure communication. A proxy entity configured for implementing the first and the second key exchange protocols for secure communication is provided. The proxy entity is configured for generating and/or provisioning one or more session keys for the first and the second devices using the key exchange protocols specific to each device for establishing secure communication between the first and second device based on the generated session key(s).
(FR)
La présente invention concerne un procédé et des systèmes pour établir une ou plusieurs sessions de communication sécurisées entre un premier dispositif et un second dispositif, le premier dispositif fonctionnant dans un réseau d'utilisateur et mettant en œuvre un premier protocole d'échange de clé pour une communication sécurisée. Le second dispositif est capable de communiquer avec le premier dispositif sur un réseau de communication sans fil. Le second dispositif met en œuvre un second protocole d'échange de clé qui est différent du premier protocole d'échange de clé pour une communication sécurisée. Une entité mandataire configurée pour mettre en œuvre les premier et second protocoles d'échange de clés pour une communication sécurisée est fournie. L'entité mandataire est configurée pour générer et/ou fournir une ou plusieurs clés de session pour les premier et second dispositifs à l'aide des protocoles d'échange de clés spécifiques à chaque dispositif pour établir une communication sécurisée entre le premier et le second dispositifs sur la base de la ou des clés de session générées.
Also published as
Latest bibliographic data on file with the International Bureau