Movatterモバイル変換


[0]ホーム

URL:


US20060288407A1 - Security and privacy enhancements for security devices - Google Patents

Security and privacy enhancements for security devices
Download PDF

Info

Publication number
US20060288407A1
US20060288407A1US10/530,293US53029305AUS2006288407A1US 20060288407 A1US20060288407 A1US 20060288407A1US 53029305 AUS53029305 AUS 53029305AUS 2006288407 A1US2006288407 A1US 2006288407A1
Authority
US
United States
Prior art keywords
security
aka
application
tamper
security device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/530,293
Inventor
Mats Naslund
Karl Norman
Tomas Goldbeck-Lowe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/530,293priorityCriticalpatent/US20060288407A1/en
Assigned to TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)reassignmentTELEFONAKTIEBOLAGET L M ERICSSON (PUBL)ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GOLDBECK-LOWE, TOMAS, NASLUND, MATS, NORRMAN, KARL
Publication of US20060288407A1publicationCriticalpatent/US20060288407A1/en
Priority to US14/309,221prioritypatent/US9282095B2/en
Priority to US15/060,678prioritypatent/US20160191510A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The invention generally relates to a tamper-resistant security device, such as a subscriber identity module or equivalent, which has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The idea according to the invention is to provide the tamper-resistant security device with an application adapted for cooperating with the AKA module and means for interfacing the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. The application is advantageously a software application implemented in an application environment of the security device. For increased security, the security device may also be adapted to detect whether it is operated in its normal secure environment or a foreign less secure environment, and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.

Description

Claims (36)

US10/530,2932002-10-072003-09-17Security and privacy enhancements for security devicesAbandonedUS20060288407A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US10/530,293US20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US14/309,221US9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices
US15/060,678US20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US41627202P2002-10-072002-10-07
PCT/SE2003/001461WO2004032557A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US10/530,293US20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/SE2003/001461A-371-Of-InternationalWO2004032557A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/309,221ContinuationUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices

Publications (1)

Publication NumberPublication Date
US20060288407A1true US20060288407A1 (en)2006-12-21

Family

ID=32069944

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US10/530,293AbandonedUS20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US14/309,221Expired - LifetimeUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices
US15/060,678AbandonedUS20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/309,221Expired - LifetimeUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices
US15/060,678AbandonedUS20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Country Status (9)

CountryLink
US (3)US20060288407A1 (en)
EP (1)EP1550341B1 (en)
KR (1)KR101047641B1 (en)
CN (1)CN100477834C (en)
AT (1)ATE350872T1 (en)
AU (1)AU2003265034A1 (en)
BR (1)BRPI0315078B1 (en)
DE (1)DE60310968T2 (en)
WO (1)WO2004032557A1 (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050286721A1 (en)*2004-06-292005-12-29Nokia CorporationProviding content in a communication system
US20060075264A1 (en)*2004-09-302006-04-06Microsoft CorporationSecurity state watcher
US20060120488A1 (en)*2004-08-202006-06-08Arie HeimanMethod and system for decoding control data in GSM-based systems using inherent redundancy
US20070105530A1 (en)*2004-08-292007-05-10Huawei Technologies Co., Ltd.Method for Ensuring Security of Subscriber Card
US20070107049A1 (en)*2005-10-212007-05-10Nokia CorporationApparatus, computer program product and method for secure authentication response in a mobile terminal
US20070147618A1 (en)*2003-11-112007-06-28Horn GuentherMethod for safeguarding data traffic between a first terminal and a first and a second terminal and a second network
US20070198834A1 (en)*2003-11-272007-08-23Rached KsontiniMethod For The Authentication Of Applications
US20070204326A1 (en)*2006-02-272007-08-30Research In Motion LimitedMethod of customizing a standardized it policy
US20070204323A1 (en)*2006-02-242007-08-30Rockwell Automation Technologies, Inc.Auto-detection capabilities for out of the box experience
US20080028229A1 (en)*2002-11-272008-01-31Priebatsch Mark HAuthenticated remote pin unblock
US20080288699A1 (en)*2007-05-172008-11-20Incard SaMethod for controlling the execution of an applet for an ic card
US20090094683A1 (en)*2007-10-042009-04-09Morgan Todd CMethod for authenticating mobile units attached to a femtocell that operates according to code division multiple access
US20090132806A1 (en)*2004-06-102009-05-21Marc BlommaertMethod for agreeing between at least one first and one second communication subscriber to security key for securing communication link
WO2009115552A2 (en)2008-03-182009-09-24Eads Secure NetworksManagement of the identities of users in a system
US20100017621A1 (en)*2008-06-202010-01-21General Instrument CorporationRadio transceiver or other encryption device having secure tamper-detection module
US20100064341A1 (en)*2006-03-272010-03-11Carlo AlderaSystem for Enforcing Security Policies on Mobile Communications Devices
US20100151822A1 (en)*2008-12-122010-06-17Microsoft CorporationSecurity Protocols for Mobile Operator Networks
WO2010069962A1 (en)*2008-12-152010-06-24Koninklijke Kpn N.V.Service-based authentication to a network
US20100223537A1 (en)*2004-08-202010-09-02Arie HeimanMethod and System for Decoding Video, Voice, and Speech Data Using Redundancy
US20100325713A1 (en)*2005-11-182010-12-23Taro KuritaMobile terminal, data communication method, and computer program
US20110004754A1 (en)*2007-06-122011-01-06John Michael WalkerMethod And Apparatuses For Authentication And Reauthentication Of A User With First And Second Authentication Procedures
US20110087884A1 (en)*2009-10-142011-04-14Texas Instruments IncorporatedMethods and Systems for Improving the Security of Password-Based Authentication Protocols for IEEE 802.11 Networks
US20110179465A1 (en)*2010-01-202011-07-21Research In Motion LimitedApparatus, and an associated method, for facilitating secure operations of a wireless device
US20110265186A1 (en)*2008-12-262011-10-27Sk Telecom Co., Ltd.Method for protecting a software license, system for same, server, terminal, and computer-readable recording medium
US20110289554A1 (en)*2005-11-212011-11-24Research In Motion LimitedSystem and method for application program operation on a wireless device
CN103200184A (en)*2013-03-142013-07-10电子科技大学Evaluation method for mobile terminal security
US8555067B2 (en)2010-10-282013-10-08Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
US20130268753A1 (en)*2012-04-042013-10-10Lockheed Martin CorporationAnti-tamper device, system, method, and computer-readable medium
WO2014079960A1 (en)2012-11-222014-05-30Koninklijke Kpn N.V.System to detect behaviour in a telecommunications network
US8787572B1 (en)2005-05-042014-07-22Marvell International Ltd.Enhanced association for access points
US20150256515A1 (en)*2014-03-062015-09-10Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US20150296378A1 (en)*2014-04-112015-10-15Blackberry LimitedMethod and apparatus for a dual radio user equipment
US20150304846A1 (en)*2014-04-172015-10-22Mavenir Systems, Inc.Gsm a3/a8 authentication in an ims network
US9450759B2 (en)2011-04-052016-09-20Apple Inc.Apparatus and methods for controlling distribution of electronic access clients
US20170279811A1 (en)*2015-05-182017-09-28Tencent Technology (Shenzhen) Company LimitedUser identification marking method, apparatus, and system
US9825774B2 (en)2008-06-042017-11-21Samsung Electronics Co., Ltd.Method of sharing usage information, and apparatus and system thereof
US9949112B2 (en)2012-12-102018-04-17Koninklijke Kpn N.V.System to protect a mobile network
US10637671B2 (en)*2016-09-122020-04-28Deutsche Telekom AgSubscriber identification system

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7181196B2 (en)2003-05-152007-02-20Lucent Technologies Inc.Performing authentication in a communications system
ATE428278T1 (en)2004-06-172009-04-15Ericsson Telefon Ab L M SECURITY IN MOBILE COMMUNICATION SYSTEMS
SK4042004A3 (en)*2004-11-232006-08-03Silentel, S. R. O.System and device for secure mobile communication
GB0428084D0 (en)*2004-12-222005-01-26Nokia CorpMethod for producing authentication information
CN100581104C (en)*2005-01-072010-01-13华为技术有限公司 A Method of Key Negotiation in IP Multimedia Service Subsystem Network
GB0504865D0 (en)*2005-03-092005-04-13Nokia CorpUser authentication in a communications system
KR100734856B1 (en)*2005-12-052007-07-03한국전자통신연구원 Universal authentication method using SAS
EP1933528B9 (en)*2006-12-122018-05-23OrangeSecure service access from a communication apparatus with a personal device
DE102009026953A1 (en)*2009-06-162010-12-23Bundesdruckerei Gmbh Method for registering a mobile device in a mobile network
EP2730112A4 (en)*2011-07-082015-05-06Nokia Corp METHOD AND APPARATUS FOR AUTHENTICATING SUBSCRIBERS TO LONG-TERM EVOLUTION TELECOMMUNICATION NETWORKS OR UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM
US8434158B2 (en)*2011-08-292013-04-30Maxim Integrated Products, Inc.Systems and methods for detecting and thwarting unauthorized access and hostile attacks on secured systems
GB201207816D0 (en)2012-05-042012-06-13Vodafone Ip Licensing LtdTelecommunication networks
CN104158721A (en)*2014-07-152014-11-19神州数码融信软件有限公司Basic information interaction system
EP3499834B1 (en)*2016-09-192021-12-01Huawei Technologies Co., Ltd.Key negotiation method and apparatus
KR101890740B1 (en)2017-02-092018-08-22충남대학교산학협력단System and method for analysing Robustness test of Bluetooth Low Energy
US10592710B1 (en)2018-10-022020-03-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
CN109768856A (en)*2018-11-192019-05-17北京计算机技术及应用研究所It is a kind of for encrypting the portable security device of moneytary operations
EP4014462A1 (en)2019-08-162022-06-22IDAC Holdings, Inc.Registration and security enhancements for a wtru with multiple usims
DE102021005869A1 (en)2020-11-262022-06-02Giesecke+Devrient Mobile Security Gmbh Method for changing an access right in a UICC

Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4748668A (en)*1986-07-091988-05-31Yeda Research And Development Company LimitedMethod, apparatus and article for identification and signature
US4853522A (en)*1986-09-161989-08-01Fujitsu LimitedSystem for permitting access to data field area in IC card for multiple services
US5386468A (en)*1992-09-141995-01-31Fujitsu LimitedMethod of registering identification number in personal communication terminal
US5422953A (en)*1993-05-051995-06-06Fischer; Addison M.Personal date/time notary device
US5537474A (en)*1994-07-291996-07-16Motorola, Inc.Method and apparatus for authentication in a communication system
US5623637A (en)*1993-12-061997-04-22Telequip CorporationEncrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5668878A (en)*1994-02-281997-09-16Brands; Stefanus AlfonsusSecure cryptographic methods for electronic transfer of information
US5740403A (en)*1991-02-191998-04-14Gemplus Card InternationalProcess circuit & system for protecting an integrated circuit against fraudulent use
US5757918A (en)*1995-01-201998-05-26Tandem Computers IncorporatedMethod and apparatus for user and security device authentication
US6141756A (en)*1998-04-272000-10-31Motorola, Inc.Apparatus and method of reading a program into a processor
US20020044648A1 (en)*2000-03-232002-04-18Benjamin AraziMethods and systems for efficient chained certification
US6470454B1 (en)*1998-03-312002-10-22International Business Machines CorporationMethod and apparatus for establishing computer configuration protection passwords for protecting computer configurations
US6507907B1 (en)*1999-02-262003-01-14Intel CorporationProtecting information in a system
US20030023871A1 (en)*2001-07-242003-01-30Thiru GnanasabapathySystem and method for code and data security in a semiconductor device
US20030028771A1 (en)*1998-01-022003-02-06Cryptography Research, Inc.Leak-resistant cryptographic payment smartcard
US20030033537A1 (en)*2001-08-082003-02-13Kabushiki Kaisha ToshibaTamper resistant microprocessor using fast context switching
US20030056100A1 (en)*2001-09-142003-03-20Rodney BeatsonMethod and system for authenticating a digitized signature for execution of an electronic document
US20030159067A1 (en)*2002-02-212003-08-21Nokia CorporationMethod and apparatus for granting access by a portable phone to multimedia services
US6687375B1 (en)*1999-06-022004-02-03International Business Machines CorporationGenerating user-dependent keys and random numbers
US6711400B1 (en)*1997-04-162004-03-23Nokia CorporationAuthentication method
US7039191B2 (en)*2000-11-222006-05-02Nec CorporationChaining key broadcasting reception system and chaining key broadcasting reception method
US7047416B2 (en)*1998-11-092006-05-16First Data CorporationAccount-based digital signature (ABDS) system
US7149308B1 (en)*2000-11-132006-12-12Stealthkey, Inc.Cryptographic communications using in situ generated cryptographic keys for conditional access
US20070189534A1 (en)*2001-03-302007-08-16Wood Matthew DEncrypting message for secure transmission

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3483055A (en)1966-03-281969-12-09Robert Wayne EshbaughMethod for forming a fiber glass racket frame
FR2718312B1 (en)*1994-03-291996-06-07Rola Nevoux Method for the combined authentication of a telecommunications terminal and a user module.
JPH08139718A (en)1994-11-041996-05-31Hitachi Ltd Cryptographic device and communication method between terminals using the same
US5651068A (en)*1995-03-081997-07-22Hewlett-Packard CompanyInternational cryptography framework
DE19530339A1 (en)1995-08-181997-02-20Degussa Fumed silica, process for its production and use
US5602918A (en)*1995-12-221997-02-11Virtual Open Network Environment Corp.Application level security system and method
EP0795844A1 (en)*1996-03-111997-09-17Koninklijke KPN N.V.Method of securely modifying data on a smart card
FR2780177B1 (en)*1998-06-172001-10-05Schlumberger Ind Sa SOFTWARE PROTECTION SYSTEM
IT245067Y1 (en)*1998-06-192002-03-194P Srl MULTI-FUNCTION HANDHELD ELECTRONIC PROCESSOR STRUCTURE.
US6816968B1 (en)*1998-07-102004-11-09Silverbrook Research Pty LtdConsumable authentication protocol and system
SG77270A1 (en)*1998-10-162000-12-19Matsushita Electric Industrial Co LtdDigital content protection system
FI107860B (en)1999-02-092001-10-15Sonera Smarttrust Oy Procedure and systems for a telecommunications system and a subscriber identity module
US6516414B1 (en)*1999-02-262003-02-04Intel CorporationSecure communication over a link
JP3389186B2 (en)*1999-04-272003-03-24松下電器産業株式会社 Semiconductor memory card and reading device
US6591116B1 (en)*1999-06-072003-07-08Nokia Mobile Phones LimitedMobile equipment and networks providing selection between USIM/SIM dependent features
WO2000077974A1 (en)1999-06-112000-12-21Liberate TechnologiesHierarchical open security information delegation and acquisition
KR100769437B1 (en)*1999-09-012007-10-22마츠시타 덴끼 산교 가부시키가이샤 Distribution system, semiconductor memory card, receiving device, computer readable recording medium and receiving method
EP1081891A3 (en)1999-09-022002-05-22Compaq Computer CorporationAutokey initialization of cryptographic devices
JP4602627B2 (en)*2000-03-092010-12-22パナソニック株式会社 Management device, editing device, audio data management system including recording medium, management device, editing device, recording medium, and method
FI108769B (en)*2000-04-072002-03-15Nokia Corp Connection of a connection point in wireless telecommunication system
US6950521B1 (en)*2000-06-132005-09-27Lucent Technologies Inc.Method for repeated authentication of a user subscription identity module
JP2002163584A (en)*2000-11-242002-06-07Fujitsu Ltd Card payment method and system using portable information terminal
CN1720578A (en)*2000-12-072006-01-11三因迪斯克公司 System, method and apparatus for playback of recorded audio, video or other content from non-volatile memory card, compact disk or other media
US6745048B2 (en)*2001-01-252004-06-01Microsoft CorporationSim manager API
JP4019303B2 (en)2001-02-022007-12-12日本電気株式会社 ENCRYPTION DEVICE AND DECRYPTION DEVICE USING ENCRYPTION KEY INCLUDED IN ELECTRONIC WATERMARK AND METHOD THEREOF
SE0101295D0 (en)2001-04-102001-04-10Ericsson Telefon Ab L M A method and network for delivering streaming data
JP2002329180A (en)*2001-04-272002-11-15Toshiba Corp Memory card having wireless communication function and data communication method thereof
FI114180B (en)*2001-06-122004-08-31Nokia Corp Improved method and device arrangement for encrypting data transmission at the interface of the radio network terminal equipment and such terminal equipment
US8549110B2 (en)*2001-06-252013-10-01Cinterion Wireless Modules GmbhMethod for transmitting data
DE10200041B4 (en)*2002-01-032021-03-25Vodafone Holding Gmbh Authentication system and procedure between two communication units
US7200756B2 (en)*2002-06-252007-04-03Microsoft CorporationBase cryptographic service provider (CSP) methods and apparatuses

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4748668A (en)*1986-07-091988-05-31Yeda Research And Development Company LimitedMethod, apparatus and article for identification and signature
US4853522A (en)*1986-09-161989-08-01Fujitsu LimitedSystem for permitting access to data field area in IC card for multiple services
US5740403A (en)*1991-02-191998-04-14Gemplus Card InternationalProcess circuit & system for protecting an integrated circuit against fraudulent use
US5386468A (en)*1992-09-141995-01-31Fujitsu LimitedMethod of registering identification number in personal communication terminal
US5422953A (en)*1993-05-051995-06-06Fischer; Addison M.Personal date/time notary device
US5623637A (en)*1993-12-061997-04-22Telequip CorporationEncrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US5668878A (en)*1994-02-281997-09-16Brands; Stefanus AlfonsusSecure cryptographic methods for electronic transfer of information
US5537474A (en)*1994-07-291996-07-16Motorola, Inc.Method and apparatus for authentication in a communication system
US5757918A (en)*1995-01-201998-05-26Tandem Computers IncorporatedMethod and apparatus for user and security device authentication
US6711400B1 (en)*1997-04-162004-03-23Nokia CorporationAuthentication method
US20030028771A1 (en)*1998-01-022003-02-06Cryptography Research, Inc.Leak-resistant cryptographic payment smartcard
US6470454B1 (en)*1998-03-312002-10-22International Business Machines CorporationMethod and apparatus for establishing computer configuration protection passwords for protecting computer configurations
US6141756A (en)*1998-04-272000-10-31Motorola, Inc.Apparatus and method of reading a program into a processor
US7047416B2 (en)*1998-11-092006-05-16First Data CorporationAccount-based digital signature (ABDS) system
US6507907B1 (en)*1999-02-262003-01-14Intel CorporationProtecting information in a system
US6687375B1 (en)*1999-06-022004-02-03International Business Machines CorporationGenerating user-dependent keys and random numbers
US20020044648A1 (en)*2000-03-232002-04-18Benjamin AraziMethods and systems for efficient chained certification
US7149308B1 (en)*2000-11-132006-12-12Stealthkey, Inc.Cryptographic communications using in situ generated cryptographic keys for conditional access
US7039191B2 (en)*2000-11-222006-05-02Nec CorporationChaining key broadcasting reception system and chaining key broadcasting reception method
US20070189534A1 (en)*2001-03-302007-08-16Wood Matthew DEncrypting message for secure transmission
US20030023871A1 (en)*2001-07-242003-01-30Thiru GnanasabapathySystem and method for code and data security in a semiconductor device
US20030033537A1 (en)*2001-08-082003-02-13Kabushiki Kaisha ToshibaTamper resistant microprocessor using fast context switching
US20030056100A1 (en)*2001-09-142003-03-20Rodney BeatsonMethod and system for authenticating a digitized signature for execution of an electronic document
US20030159067A1 (en)*2002-02-212003-08-21Nokia CorporationMethod and apparatus for granting access by a portable phone to multimedia services

Cited By (96)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080028229A1 (en)*2002-11-272008-01-31Priebatsch Mark HAuthenticated remote pin unblock
US9118668B1 (en)*2002-11-272015-08-25Assa Abloy AbAuthenticated remote pin unblock
US8495381B2 (en)*2002-11-272013-07-23ActivcardAuthenticated remote PIN unblock
US20160044027A1 (en)*2002-11-272016-02-11Assa Abloy AbAuthenticated remote pin unblock
US9560041B2 (en)*2002-11-272017-01-31Assa Abloy AbAuthenticated remote pin unblock
US9893892B2 (en)*2002-11-272018-02-13Assa Abloy AbAuthenticated remote pin unblock
US20070147618A1 (en)*2003-11-112007-06-28Horn GuentherMethod for safeguarding data traffic between a first terminal and a first and a second terminal and a second network
US8345882B2 (en)*2003-11-112013-01-01Siemens AktiengesellschaftMethod for safeguarding data traffic between a first terminal and a first network and a second terminal and a second network
US9143888B2 (en)2003-11-272015-09-22Nagravision S.A.Method for the authentication of applications
US8813253B2 (en)2003-11-272014-08-19Nagravision S.A.Method for the authentication of applications
US8261365B2 (en)*2003-11-272012-09-04Nagravision S.A.Method for the authentication of applications
US20070198834A1 (en)*2003-11-272007-08-23Rached KsontiniMethod For The Authentication Of Applications
US9531681B2 (en)2003-11-272016-12-27Nagravision S.A.Method for the authentication of applications
US20090132806A1 (en)*2004-06-102009-05-21Marc BlommaertMethod for agreeing between at least one first and one second communication subscriber to security key for securing communication link
US7765404B2 (en)*2004-06-292010-07-27Nokia CorporationProviding content in a communication system
US20050286721A1 (en)*2004-06-292005-12-29Nokia CorporationProviding content in a communication system
US8046662B2 (en)*2004-08-202011-10-25Broadcom CorporationMethod and system for decoding control data in GSM-based systems using inherent redundancy
US8924830B2 (en)2004-08-202014-12-30Broadcom CorporationMethod and system for decoding control data in GSM-based systems using inherent redundancy
US8359523B2 (en)2004-08-202013-01-22Broadcom CorporationMethod and system for decoding video, voice, and speech data using redundancy
US20100223537A1 (en)*2004-08-202010-09-02Arie HeimanMethod and System for Decoding Video, Voice, and Speech Data Using Redundancy
US20060120488A1 (en)*2004-08-202006-06-08Arie HeimanMethod and system for decoding control data in GSM-based systems using inherent redundancy
US20070105530A1 (en)*2004-08-292007-05-10Huawei Technologies Co., Ltd.Method for Ensuring Security of Subscriber Card
US7650139B2 (en)*2004-08-292010-01-19Huawei Technologies Co., Ltd.Method for ensuring security of subscriber card
US20060075264A1 (en)*2004-09-302006-04-06Microsoft CorporationSecurity state watcher
US7574610B2 (en)*2004-09-302009-08-11Microsoft CorporationSecurity state watcher
US8787572B1 (en)2005-05-042014-07-22Marvell International Ltd.Enhanced association for access points
US8291222B2 (en)*2005-06-102012-10-16Siemens AktiengesellschaftMethod for agreeing between at least one first and one second communication subscriber to security key for securing communication link
US20070107049A1 (en)*2005-10-212007-05-10Nokia CorporationApparatus, computer program product and method for secure authentication response in a mobile terminal
US8316426B2 (en)*2005-10-212012-11-20Nokia CorporationApparatus, computer program product and method for secure authentication response in a mobile terminal
US20100325713A1 (en)*2005-11-182010-12-23Taro KuritaMobile terminal, data communication method, and computer program
US8832441B2 (en)*2005-11-182014-09-09Felica Networks, Inc.Mobile terminal, data communication method, and computer program
US8699999B2 (en)2005-11-212014-04-15Blackberry LimitedSystem and method for application program operation on a wireless device
US20110289554A1 (en)*2005-11-212011-11-24Research In Motion LimitedSystem and method for application program operation on a wireless device
US8254884B2 (en)*2005-11-212012-08-28Research In Motion LimitedSystem and method for application program operation on a wireless device
US20070204323A1 (en)*2006-02-242007-08-30Rockwell Automation Technologies, Inc.Auto-detection capabilities for out of the box experience
US9621587B2 (en)2006-02-272017-04-11Blackberry LimitedMethod of customizing a standardized IT policy
US8544057B2 (en)2006-02-272013-09-24Blackberry LimitedMethod of customizing a standardized IT policy
US8689284B2 (en)2006-02-272014-04-01Blackberry LimitedMethod of customizing a standardized IT policy
US20070204324A1 (en)*2006-02-272007-08-30Research In Motion LimitedMethod of customizing a standardized it policy
US8332906B2 (en)2006-02-272012-12-11Research In Motion LimitedMethod of customizing a standardized IT policy
US20070204326A1 (en)*2006-02-272007-08-30Research In Motion LimitedMethod of customizing a standardized it policy
US20100064341A1 (en)*2006-03-272010-03-11Carlo AlderaSystem for Enforcing Security Policies on Mobile Communications Devices
US8413209B2 (en)*2006-03-272013-04-02Telecom Italia S.P.A.System for enforcing security policies on mobile communications devices
US8881264B2 (en)*2007-05-172014-11-04Stmicroelectronics International N.V.Method for controlling the execution of an applet for an IC card
US20080288699A1 (en)*2007-05-172008-11-20Incard SaMethod for controlling the execution of an applet for an ic card
US20110004754A1 (en)*2007-06-122011-01-06John Michael WalkerMethod And Apparatuses For Authentication And Reauthentication Of A User With First And Second Authentication Procedures
CN103036683A (en)*2007-10-042013-04-10朗讯科技公司Method for authenticating mobile units attached to a femtocell in communication with a secure core network such as an IMS network
CN101816199B (en)*2007-10-042016-11-02朗讯科技公司 Authentication method for a mobile unit attached to a femtocell communicating with a secure core network such as IMS
US8224921B2 (en)*2007-10-042012-07-17Alcatel LucentMethod for authenticating mobile units attached to a femtocell that operates according to code division multiple access
US20090094683A1 (en)*2007-10-042009-04-09Morgan Todd CMethod for authenticating mobile units attached to a femtocell that operates according to code division multiple access
US8230035B2 (en)*2007-10-042012-07-24Alcatel LucentMethod for authenticating mobile units attached to a femtocell that operates according to code division multiple access
KR101121465B1 (en)*2007-10-042012-03-19알카텔-루센트 유에스에이 인코포레이티드Method for authenticating mobile units attached to a femtocell in communication with a secure core netowrk such as an ims
WO2009045317A3 (en)*2007-10-042009-09-11Lucent Technologies Inc.Method for authenticating mobile units attached to a femtocell in communication with a secure core network such as an ims
AU2008307670B2 (en)*2007-10-042011-06-16Lucent Technologies Inc.Method for authenticating mobile units attached to a femtocell in communication with a secure core network such as an IMS
TWI514830B (en)*2007-10-042015-12-21朗訊科技公司Method for authenticating mobile units attached to a femtocell that operates according to code division multiple access
US20110269428A1 (en)*2007-10-042011-11-03Lucent Technologies, Inc.Method for authenticating mobile units attached to a femtocell that operates according to code division multiple access
WO2009115552A2 (en)2008-03-182009-09-24Eads Secure NetworksManagement of the identities of users in a system
KR101620934B1 (en)2008-03-182016-05-13에어버스 디에스 에스아에스Management of the identities of users in a system
WO2009115552A3 (en)*2008-03-182009-11-26Eads Secure NetworksManagement of the identities of users in a system
US20110018683A1 (en)*2008-03-182011-01-27Eads Secure NetworksManagement of the identities of users in a system
US9825774B2 (en)2008-06-042017-11-21Samsung Electronics Co., Ltd.Method of sharing usage information, and apparatus and system thereof
US8006101B2 (en)2008-06-202011-08-23General Instrument CorporationRadio transceiver or other encryption device having secure tamper-detection module
US20100017621A1 (en)*2008-06-202010-01-21General Instrument CorporationRadio transceiver or other encryption device having secure tamper-detection module
US9270700B2 (en)*2008-12-122016-02-23Microsoft Technology Licensing, LlcSecurity protocols for mobile operator networks
US20100151822A1 (en)*2008-12-122010-06-17Microsoft CorporationSecurity Protocols for Mobile Operator Networks
US8881235B2 (en)2008-12-152014-11-04Koninklijke Kpn N.V.Service-based authentication to a network
WO2010069962A1 (en)*2008-12-152010-06-24Koninklijke Kpn N.V.Service-based authentication to a network
CN102318386A (en)*2008-12-152012-01-11皇家Kpn公司Service-based authentication to a network
US20110265186A1 (en)*2008-12-262011-10-27Sk Telecom Co., Ltd.Method for protecting a software license, system for same, server, terminal, and computer-readable recording medium
US20110087884A1 (en)*2009-10-142011-04-14Texas Instruments IncorporatedMethods and Systems for Improving the Security of Password-Based Authentication Protocols for IEEE 802.11 Networks
US8433918B2 (en)*2009-10-142013-04-30Texas Instruments IncorporatedMethods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks
US20110179465A1 (en)*2010-01-202011-07-21Research In Motion LimitedApparatus, and an associated method, for facilitating secure operations of a wireless device
US9264448B2 (en)*2010-01-202016-02-16Blackberry LimitedApparatus, and an associated method, for facilitating secure operations of a wireless device
US9877194B2 (en)2010-10-282018-01-23Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
US10206106B2 (en)2010-10-282019-02-12Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
WO2012058429A3 (en)*2010-10-282014-04-10Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
US8555067B2 (en)2010-10-282013-10-08Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
US9788209B2 (en)2011-04-052017-10-10Apple Inc.Apparatus and methods for controlling distribution of electronic access clients
US9450759B2 (en)2011-04-052016-09-20Apple Inc.Apparatus and methods for controlling distribution of electronic access clients
US8843739B2 (en)*2012-04-042014-09-23Lockheed Martin CorporationAnti-tamper device, system, method, and computer-readable medium
US20130268753A1 (en)*2012-04-042013-10-10Lockheed Martin CorporationAnti-tamper device, system, method, and computer-readable medium
WO2014079960A1 (en)2012-11-222014-05-30Koninklijke Kpn N.V.System to detect behaviour in a telecommunications network
US10924500B2 (en)2012-11-222021-02-16Koninklijke Kpn N.V.System to detect behaviour in a telecommunications network
EP3474589A1 (en)2012-11-222019-04-24Koninklijke KPN N.V.System to detect behaviour in a telecommunications network
US9949112B2 (en)2012-12-102018-04-17Koninklijke Kpn N.V.System to protect a mobile network
CN103200184A (en)*2013-03-142013-07-10电子科技大学Evaluation method for mobile terminal security
US10554627B2 (en)*2014-03-062020-02-04Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US20150256515A1 (en)*2014-03-062015-09-10Samsung Electronics Co., Ltd.Proximity communication method and apparatus
US9866588B2 (en)2014-04-112018-01-09Blackberry LimitedMethod and apparatus for a dual radio user equipment
US9693225B2 (en)*2014-04-112017-06-27Blackberry LimitedMethod and apparatus for a dual radio user equipment
US20150296378A1 (en)*2014-04-112015-10-15Blackberry LimitedMethod and apparatus for a dual radio user equipment
US20150304846A1 (en)*2014-04-172015-10-22Mavenir Systems, Inc.Gsm a3/a8 authentication in an ims network
US9526005B2 (en)*2014-04-172016-12-20Mitel Mobility Inc.GSM A3/A8 authentication in an IMS network
US10516673B2 (en)*2015-05-182019-12-24Tencent Technology (Shenzhen) Company LimitedUser identification marking method, apparatus, and system
US20170279811A1 (en)*2015-05-182017-09-28Tencent Technology (Shenzhen) Company LimitedUser identification marking method, apparatus, and system
US10637671B2 (en)*2016-09-122020-04-28Deutsche Telekom AgSubscriber identification system

Also Published As

Publication numberPublication date
EP1550341B1 (en)2007-01-03
EP1550341A1 (en)2005-07-06
DE60310968D1 (en)2007-02-15
KR20050083729A (en)2005-08-26
AU2003265034A1 (en)2004-04-23
US20140304768A1 (en)2014-10-09
DE60310968T2 (en)2007-10-11
CN1689367A (en)2005-10-26
CN100477834C (en)2009-04-08
ATE350872T1 (en)2007-01-15
US20160191510A1 (en)2016-06-30
BR0315078A (en)2005-08-16
WO2004032557A1 (en)2004-04-15
US9282095B2 (en)2016-03-08
KR101047641B1 (en)2011-07-08
BRPI0315078B1 (en)2019-08-20

Similar Documents

PublicationPublication DateTitle
US9282095B2 (en)Security and privacy enhancements for security devices
CN1969580B (en)Security in a mobile communications system
KR101158956B1 (en)Method for distributing certificates in a communication system
US7444513B2 (en)Authentication in data communication
CN1857024B (en)Enhanced security design for cryptography in mobile communication systems
JP4663011B2 (en) Method for matching a secret key between at least one first communication subscriber and at least one second communication subscriber to protect the communication connection
US8726019B2 (en)Context limited shared secret
US20100135491A1 (en)Authentication method
US20050086465A1 (en)System and method for protecting network management frames
US20110271330A1 (en)Solutions for identifying legal user equipments in a communication network
US8875236B2 (en)Security in communication networks
KR20120101523A (en)Secure multi-uim authentication and key exchange
CN101990201B (en)Method, system and device for generating general bootstrapping architecture (GBA) secret key
US7913096B2 (en)Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
TW200527877A (en)Method and application for authentication of a wireless communication using an expiration marker
US20210256102A1 (en)Remote biometric identification
HallDetection of rogue devices in wireless networks
CN117915322A (en) A slice secondary authentication method and system based on key integrity detection
KR100932275B1 (en) Restriction Method of Subscriber Identity Module Using TPM and Mobile Terminal for the Same
WiederkehrApproaches for simplified hotspot logins with Wi-Fi devices
BodriagovA secure mobile phone-based interactive logon in Windows
ErikssonSecurity in Unlicensed Mobile Access
HK1164019A (en)Service-based authentication to a network

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:TELEFONAKTIEBOLAGET L M ERICSSON (PUBL), SWEDEN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NASLUND, MATS;NORRMAN, KARL;GOLDBECK-LOWE, TOMAS;REEL/FRAME:018032/0948

Effective date:20050405

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION


[8]ページ先頭

©2009-2025 Movatter.jp