H04L2463/061

METHOD AND SYSTEM FOR ANONYMOUS USER DATA STORAGE AND CONTROLLED DATA ACCESS
20210122483 · 2021-04-29 ·

Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external to a user's computing device) and the user's data is maintained anonymously. Content is stored in association with a user identifier and access by third parties is controlled by linked third party identifiers.

Bootstrapping Devices on a Network
20210120406 · 2021-04-22 ·

Methods for operating a device and for managing bootstrapping of devices are disclosed. The method (100) for operating a device comprises computing (102) a derivative of a secret shared between the device and a server entity of a network, generating (104) a temporary bootstrap URI by combining at least a part of the computed derivative with a static bootstrap URI for the network, and sending (106) a bootstrap request to the temporary bootstrap URI. The method for managing bootstrapping of devices comprises generating temporary bootstrap URIs corresponding to devices operable to connect to a network, and updating a network DNS registry to map the generated temporary bootstrap URIs to the IP address of at least one of a bootstrap server instance reachable via the network and/or a bootstrap load balancer. Also disclosed are a device, a bootstrap load balancer, a bootstrap server, and a computer program.

Communication over quantum channels with enhanced performance and security

This invention disclosure describes how the security of existing quantum key distribution protocols can be enhanced with the use of a ternary/binary arithmetic conversion along with shared keys between communicating parties. With these schemes, Bob can detect eavesdropping attacks without exchanging the content of the transmitted data stream with the Alice. Addressable physical unclonable function (PUF) technology can be exploited to design protocols that securely exchange the shared keys.

Generation of keys of variable length from cryptographic tables

A cryptographic infrastructure, which provides a method for generating private keys of variable length from a cryptographic table and a public key. This infrastructure provides an approximation of the one-time pad scheme. The cryptographic table is shared between a message sender and a message recipient by a secure transfer. After sharing the cryptographic table, no new private keys need to be sent—the private keys are independently generated by each party from the data contained within the shared cryptographic tables, using the public key. After public keys are exchanged, private keys may be generated and used to encrypt and decrypt messages and perform authentication cycles, establishing a secure communication environment between the sender and the recipient.

System and method for user device authentication or identity validation without passwords or matching tokens
11005971 · 2021-05-11 ·

A novel computerized method for authenticating a client computer is disclosed. The method for authenticating the client computer does not utilize any stored usernames, passwords, or tokens. The process stores a series of algorithmic functions on the client computer. When the user desires to login to a server computer the server computer provides multiple sets of variables to the client computer. The variables are input into the algorithmic functions. The functions generate an output. The output is sent to the server computer. The server computer utilizes the client generated output to authenticate the client device. Each time the user desires to login different variables are utilized to prevent prediction and hacking of the system.

METHOD AND DEVICE FOR GENERATING ACCESS STRATUM KEY IN COMMUNICATIONS SYSTEM
20210076207 · 2021-03-11 ·

In one example method for generating an access stratum key in a communication system, a terminal device acquires an input parameter, where the terminal device is communicably coupled to a first network-side device through a first air interface and at the same time is communicably coupled to a second network-side device through a second air interface. The terminal device has access to a core network via the first network-side device, and has access to the core network via the second network-side device which has access to the core network through the first network-side device. The terminal device calculates an access stratum root key of the second air interface according to the input parameter and an access stratum root key of the first air interface, and generates an access stratum key of the second air interface according to the access stratum root key of the second air interface.

SECURITY KEY DERIVATION IN DUAL CONNECTIVITY
20210058426 · 2021-02-25 ·

The disclosure relates to methods for establishing a secure communication link between a mobile station and a secondary base station in a mobile communication system. The disclosure is also providing mobile communication system for performing these methods, and computer readable media the instructions of which cause the mobile communication system to perform the methods described herein. Specifically, the disclosure suggests that in response to the detected or signaled potential security breach, the master base station increments a freshness counter for re-initializing the communication between the mobile station and the secondary base station; and the mobile station and the secondary base station re-initialize the communication there between. The re-initialization is performed under the control of the master base station and further includes deriving a same security key based on said incremented freshness counter, and establishing the secure communication link utilizing the same, derived security key.

METHOD, APPARATUS, AND SYSTEM FOR PERFORMING AN ESTABLISHMENT OF A SECURITY CONTEXT BETWEEN USER EQUIPMENT AND AN ACCESS NODE
20210076214 · 2021-03-11 ·

Embodiments of the present invention disclose a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption.

SYSTEMS, METHODS AND DEVICES FOR ADDING NON-PROVISIONED CELLULAR DEVICES TO A SUBSCRIPTION

Non-pre-provisioned cellular Internet of things (IoT) devices can be added to an existing user's subscription with an operator and a service provider. The procedure can include obtaining a security association between a device and a user's smartphone using the operator's network. The operator and the service provider can verify the device with a certificate authority. In one embodiment, the smartphone reads (302) a URL pointer to the device certification and sends it (304) to the MME. The MME forwards (306) the URL to the HSS. The HSS verifies (312) the certificate and derives security credentials including the Master key K. The HSS also derives another key K used to establish security context between the IoT device and the smartphone. The device uses its key deriving function KDF with K and Rand to generate K.

Method and system for providing security from a radio access network

The disclosure relates to a security method in a radio access network system. A shared secret key is stored in both a user device and a core network system. A further secret key is received from the core network system, wherein the further secret key has been derived using the shared secret key stored in the core network system. One or more values are provided over the radio interface to the user device to derive the further secret key in the user device from at least the shared secret key stored in the user device and one or more of the one or more values provided over the radio interface. An authentication procedure and/or a key agreement procedure is performed for the user device over the wireless radio interface using the received further secret key in the radio access network system and the derived further secret key in the user device.