Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020117903 - SECURITY LIFECYCLE MANAGEMENT OF DEVICES IN A COMMUNICATIONS NETWORK

Publication Number WO/2020/117903
Publication Date 11.06.2020
International Application No. PCT/US2019/064404
International Filing Date 04.12.2019
IPC
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/04 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
04Key management
H04W 4/70 2018.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
70Services for machine-to-machine communication or machine type communication
H04W 8/20 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
8Network data management
18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
20Transfer of user or subscriber data
CPC
H04W 12/002
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
002Mobile device security; Mobile application security
H04W 12/0403
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0403using a trusted network node as anchor
H04W 4/70
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
H04W 48/16
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
48Access restriction
16Discovering, processing access restriction or access information
H04W 60/04
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
60Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
04using triggered events
Applicants
  • CONVIDA WIRELESS, LLC [US]/[US]
Inventors
  • CHOYI, Vinod, Kumar
  • WANG, Chonggang
  • SEED, Dale, N.
Agents
  • SAMUELS, Steven, B.
Priority Data
62/776,00406.12.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURITY LIFECYCLE MANAGEMENT OF DEVICES IN A COMMUNICATIONS NETWORK
(FR) GESTION DE CYCLE DE VIE DE SÉCURITÉ DE DISPOSITIFS DANS UN RÉSEAU DE COMMUNICATION
Abstract
(EN)
Described herein are complete lifecycle management processes for loT/M2M devices, which are commissioned and de-commissioned in a given system without requiring a user/human administrator. A delegated life-cycle management process is described, wherein devices rely upon a delegatee, which may have more computing and battery resources than the devices. Further, a Trust Enabling Infrastructure (TEI) is described herein, which may belong to a different trusted domain than the given device and its delegatee. A device in response to powering on for the first time, registers with a trust enabling infrastructure (TEI) and generates one or more credentials based on the registration with the TEI so as to define a trust relationship with the TEI. A fter the registration, the device receives one or more security components and policies from the TEI and installs the one or more security components so as to define a secure environment.
(FR)
L'invention concerne des processus complets de gestion de cycle de vie pour des dispositifs loT/M2M, qui sont mis en service et hors service dans un système donné sans nécessiter un utilisateur/administrateur humain. L'invention concerne un processus de gestion de cycle de vie délégué, dans lequel des dispositifs reposent sur un délégataire, qui peut avoir plus de ressources informatiques et de batterie que les dispositifs. En outre, l'invention concerne une infrastructure d'activation de confiance (TEI), qui peut appartenir à un domaine de confiance différent du dispositif donné et de son délégataire. Un dispositif, en réponse à la mise sous tension pour la première fois, s'enregistre auprès d'une infrastructure d'activation de confiance (TEI) et génère un ou plusieurs justificatifs d'identité sur la base de l'enregistrement auprès de la TEI de façon à définir une relation de confiance avec la TEI. Après l'enregistrement, le dispositif reçoit un ou plusieurs composants et politiques de sécurité à partir de la TEI et installe les un ou plusieurs composants de sécurité de façon à définir un environnement sécurisé.
Latest bibliographic data on file with the International Bureau