Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. KR1020100082374 - KEY MANAGEMENT METHOD

Office République de Corée
Numéro de la demande 1020107013125
Date de la demande 14.11.2008
Numéro de publication 1020100082374
Date de publication 16.07.2010
Type de publication A
CIB
H04L 9/08
HÉLECTRICITÉ
04TECHNIQUE DE LA COMMUNICATION ÉLECTRIQUE
LTRANSMISSION D'INFORMATION NUMÉRIQUE, p.ex. COMMUNICATION TÉLÉGRAPHIQUE
9Dispositions pour les communications secrètes ou protégées
08Répartition de clés
H04L 9/32
HÉLECTRICITÉ
04TECHNIQUE DE LA COMMUNICATION ÉLECTRIQUE
LTRANSMISSION D'INFORMATION NUMÉRIQUE, p.ex. COMMUNICATION TÉLÉGRAPHIQUE
9Dispositions pour les communications secrètes ou protégées
32comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06
HÉLECTRICITÉ
04TECHNIQUE DE LA COMMUNICATION ÉLECTRIQUE
LTRANSMISSION D'INFORMATION NUMÉRIQUE, p.ex. COMMUNICATION TÉLÉGRAPHIQUE
29Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes H04L1/-H04L27/135
02Commande de la communication; Traitement de la communication
06caractérisés par un protocole
H04L 12/22
HÉLECTRICITÉ
04TECHNIQUE DE LA COMMUNICATION ÉLECTRIQUE
LTRANSMISSION D'INFORMATION NUMÉRIQUE, p.ex. COMMUNICATION TÉLÉGRAPHIQUE
12Réseaux de données à commutation
02Détails
22Dispositions pour interdire la prise de données sans autorisation dans un canal de transmission de données
CPC
H04L 63/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
H04L 9/0844
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
0841involving Diffie-Hellman or related key agreement protocols
0844with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
H04L 9/3236
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
H04L 9/3273
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3271using challenge-response
3273for mutual authentication
H04L 63/1458
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1458Denial of Service
H04W 12/04
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements; Authentication; Protecting privacy or anonymity
04Key management, e.g. using generic bootstrapping architecture [GBA]
Déposants CHINA IWNCOMM CO., LTD.
차이나 아이더블유엔콤 씨오., 엘티디
Inventeurs TIE MANXIA
티에, 맨시아
CAO JUN
카오, 준
PANG LIAOJUN
팡, 리아오준
LAI XIAOLONG
라이, 시아오롱
HUANG ZHENHAI
황, 젠하이
Mandataires 허용록
Données relatives à la priorité 200710019090.9 16.11.2007 CN
Titre
(EN) KEY MANAGEMENT METHOD
(KO) 키 관리 방법
Abrégé
(EN)
A key management method, is an enhanced RSNA four-way Handshake protocol. Its preceding two way Handshake processes comprises: 1), an authenticator sending a new message which is added a Key Negotiation IDentifier (KNID) and a Message Integrity Code (MIC) based on the intrinsic definition content of the message to a applicant; 2), after the applicant receives the new message, checking whether the MIC therein is correct; if no, the applicant discarding the received new message (1); if yes, checking the new message, if the checking is successful, sending a message to the authenticator; the process of checking the new message being the same as the checking process for the message defined in the IEEE 802.11i-2004 standard document. The method solves the DoS attack problem of the key management protocol in the existing RSNA security mechanism. COPYRIGHT KIPO WIPO 2010

(KO)
키 관리 방법은 개선된 RSNA 4-방향 핸드쉐이크 프로토콜이다. 그 선행하는 양방향 핸드쉐이크 프로세스는: 1) 인증자가 메시지 1의 고유 정의 내용을 기반으로 KNID(Key Negotiation IDentification) 및 MIC(Message Integrity Code)가 추가된 새로운 메시지 1을 요청자에게 송신하는 단계; 2) 요청자가 새로운 메시지 1을 수신한 후, 그 안에 포함된 MIC가 정확한지 여부를 확인하는 단계; 정확하지 않으면, 요청자가 상기 수신된 새로운 메시지 1을 폐기하는 단계; 정확하면, 새로운 메시지 2를 확인하는 단계, 확인이 성공하면, 메시지 2를 인증자로 송신하는 단계를 포함하고, 새로운 메시지를 확인하는 프로세스는 IEEE 802.11i-2004 표준 문서에 정의된 메시지 1을 위한 확인 프로세스와 동일하다. 상기 방법은 종래의 RSNA 보안 메커니즘의 키 관리 프로토콜의 DoS 공격 문제점을 해결한다.

Également publié en tant que
RU2010123869