WO2002043427A1 - Ipsec connections for mobile wireless terminals - Google Patents

Ipsec connections for mobile wireless terminals Download PDF

Info

Publication number
WO2002043427A1
WO2002043427A1 PCT/EP2001/013704 EP0113704W WO0243427A1 WO 2002043427 A1 WO2002043427 A1 WO 2002043427A1 EP 0113704 W EP0113704 W EP 0113704W WO 0243427 A1 WO0243427 A1 WO 0243427A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
gateway
node
certificate
terminal
Prior art date
Application number
PCT/EP2001/013704
Other languages
French (fr)
Inventor
Esa Turtiainen
Jarri Arkko
Pasi Ahonen
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to AU2002229566A priority Critical patent/AU2002229566A1/en
Publication of WO2002043427A1 publication Critical patent/WO2002043427A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity

Abstract

A method of authenticating a mobile wireless terminal (4) to a correspondent node (2), the method comprising: authenticating and identifying the mobile terminal (4) to a gateway (8) node of a mobile telecommunications network (5); at the gateway node (8), obtaining a certificate for the mobile terminal (4), which certificate can be used to identify the mobile terminal (4) and to authenticate the gateway node (8); sending the certificate from the gateway node (8) to the correspondent node (2); and at the correspondent node (2), using the received certificate to authenticate the gateway node (8) and to identify the mobile terminal (2).

Description

IPSEC CONNECTIONS FOR MOBILE WIRELESS TERMINALS
The present invention is related to the optimisation of IPSec data transfer mechanisms for mobile wireless terminals and more particularly to the optimisation of IPSec authentication procedures.
Background to the invention
IP connections between mobile wireless terminals (such as mobile telephones, communicators, and PDAs with wireless communication facilities) and entities such as corporate intranets are becoming increasingly popular. However, an organisation maintaining an intranet may wish to restrict access to selected users and to ensure that all data transfer between the intranet and those users is securely encrypted. IPSec (Internet Protocol Security) is a set of protocols which has been defined by the Internet Engineering Task Force (RFC2401) to provide a security mechanism for IP and certain upper layer protocols such as UDP and TCP. IPSec protects IP packets and upper layer protocols during transmission between peer nodes by introducing proof of origin (i.e. authentication) and encryption. IPSec allows the creation of so-called Virtual Private Networks (VPNs).
In order to allow IPSec packets to be properly encapsulated and decapsulated it is necessary to associate security services (and parameters) between the traffic being transmitted and the remote node which is the intended recipient of the traffic. The construct used for this purpose is a "Security Association" (SA). SAs are negotiated between peer nodes using a mechanism known as "Internet Key Exchange" (IKE), and are allocated an identification known as a "Security Parameter Index" (SPI). The appropriate SA is identified to the receiving node by including the corresponding SPI in the IPSec header. Details of the existing SAs and the respective SPIs are maintained in a Security Association Database (SAD) which is associated with each IPSec node.
The security of the process depends crucially on the security of the initial identification of the nodes involved. A corporate intranet gateway needs to be sure that a mobile terminal initiating IKE is authorised to do so. IKE includes within it a mechanism to perform such authentication, as do other known mechanisms such as SSL and TLS. All of these mechanisms are based on public key cryptography and rely on the guarantee of a trusted (typically independent) Certification Authority (CA) that a particular user is associated with a particular key. Each node must obtain a public-private key pair. Messages encoded with a node's private key can only be decoded with the corresponding public key, and those encoded with the public key can only be decoded with the private key. Thus if a node sends a message encoded with the private key, the recipient can authenticate the message as coming from that node if he can decode the message using the public key and if he can be sure that the public key is associated with that node. The CA's task is to ensure that the association between public keys and nodes can be trusted.
This is achieved by the CA issuing certificates to the nodes at the same time as they obtain their initial public-private key pair. The certificate for a particular node may include the public key of that node together with the identity of the node. The certificate is itself "signed" by encrypting it with the private key of the CA. Thus another node receiving this certificate can be sure it was "signed" by the CA if it can be unencrypted using the public key of the CA. He can then also be sure of the association between the first node and its public key. Using such guarantees, connections can be opened in a scalable way since not everybody needs to know everybody else beforehand: it is only necessary to know the public key of the CA.
These mechanisms can theoretically be used by mobile terminals. In practice, however, their deployment is difficult for a number of reasons.
Firstly, in order to participate in the authentication process of IKE, SSL, or TLS, a terminal needs a public-private key pair, as described above. The generation of this key pair requires a large amount of computational power, together with sophisticated software and preferably also a means for generating random numbers. Mobile terminals frequently do not have sufficient resources to cope with these demands.
Furthermore, the terminal needs to obtain a certificate from a CA guaranteeing the association of the key pair, the user, and the CA. In order to do this, the user must provide identification information (and may even have to attend the CA in person, e.g. to present his or her passport), and must operate complex software on the terminal to correspond with the CA server over the Internet. In some cases, it is even necessary to copy and paste text between the terminal's user interface and an Internet server. These are complicated tasks on an ordinary mobile terminal, especially for inexperienced users. Again, the problem also arises that the terminal must have sufficient resources to run the complex software, and this is frequently not the case.
One method which has been proposed to circumvent this problem is to combine the IP level authentication performed using the IKE protocol with the existing and computationally simple Global System for Mobile communications (GSM) SIM authentication (SIM authentication is normally carried out for subscribers of mobile telecommunication (GSM) networks upon registration of a subscriber with a network). The proposal is made in the IETF draft titled "GSM SIM Authentication Mode for IKE" submitted by J. Rinnemaa of Nokia Oy, and involves wrapping certain SIM authentication information in ISAKMP messages of IKE. This avoids the need for a) RSA operations, b) certificate generation, c) initial key generation, and d) initial certificate enrolment, although it remains necessary to perform Diffie-Hellman and the remaining IKE tasks. Using this mechanism, IP connections can be initialised without excessive computational load and there is no significant additional configuration or setup burden on the terminal users.
The problem with this approach is that, if a connection is required between the mobile wireless terminal and a security gateway of say a corporate intranet, in order to perform the SIM authentication the gateway requires access to authentication triplets from the GSM network. These authentication triplets must be obtained by the security gateway from the Home Location Register (HLR) or Authentication Centre (AUC) node of the GSM network. It is however unlikely that operators would be willing to divulge this information to third parties as it can be used for fraudulent purposes such as cell phone cloning. This approach can in practice only be used where the security gateway is owned by the operator of the mobile network and does not solve the problem of the authentication of a mobile terminal wishing to connect to a security gateway outside the control of the network operator. Statement of the Invention
The inventors of the present invention have realised that many mobile terminals do not have sufficient resources to use standard authentication methods for IP traffic. Furthermore, it is unlikely that mobile terminals will be permitted to use SIM based authentication procedures with entities other than the mobile network's own nodes.
It is an object of the present invention to overcome or at least mitigate the disadvantages noted in the preceding paragraphs. This and other objects are achieved at least in part by providing a two-leg authentication procedure from the mobile terminal to a correspondent node. The first leg is an authentication between the mobile terminal and an operator-owned gateway, in which the mobile terminal is authenticated to the gateway using a mechanism such as SIM authentication. The second leg is an onward authentication between the operator-owned gateway and the correspondent node, with the operator-owned gateway authenticating the mobile terminal to the correspondent node.
According to a first aspect of the present invention there is provided a method of authenticating a mobile wireless terminal to a correspondent node for the purpose of establishing an IP connection between the terminal and the node, the method comprising: authenticating and identifying the mobile terminal to a gateway node of a mobile telecommunications network; at the gateway node, obtaining a certificate for the mobile terminal, which certificate can be used to identify and authenticate the mobile terminal; sending the certificate from the gateway node to the correspondent node; and at the correspondent node, using the received certificate to identify and authenticate the mobile terminal.
Embodiments of the invention do not require that the mobile terminal authenticate itself directly to the correspondent node. Rather, the correspondent node trusts the gateway node to authenticate the mobile terminal. In particular, the correspondent node trusts the gateway node to maintain the security of the mapping between the mobile terminal's identity and the determined certificate.
The gateway node is preferably an operator-owned security gateway, and this operator gateway preferably determines a public-private key pair on behalf of the mobile terminal, together with the certificate for the mobile terminal based on a mapping of a unique identifier (such as the E.164 address or TMSI) of the terrninal.
Preferably, the certificate identified by the gateway is a public key certificate obtained from a certification authority (CA). The certificate contains ter alia an identifier of the mobile terminal, e.g. the telephone number. Assuming that the mobile terminal is authenticated to the correspondent node, the correspondent node preferably determines whether or not to authorise access to the mobile terminal on the basis of said identifier.
Preferably, said steps of sending the certificate from the gateway node to the correspondent node and of using the received certificate to authenticate the mobile terminal both form part of an IKE Phase 1 procedure. Similarly, the step of authenticating the mobile terminal to the gateway node forms part of a separate IKE Phase 1 procedure. However, this procedure makes use of the SIM authentication procedure using the subscriber's IMSI. More particularly, SIM authentication data is wrapped inside ISAKMP messages of the IKE Phase 1 procedure.
The method of the first aspect of the invention may be carried out following the initiation of an connection by the mobile wireless terminal or by the correspondent node. The order in which the steps of the method are carried out need not follow the listed order.
In a preferred embodiment, the mobile terminal attempts to perform IKE with the correspondent node, and this attempt is recognised by the operator gateway, causing the operator gateway to authenticate the mobile terminal to the correspondent node and handle IKE negotiations with the correspondent node on behalf of the mobile terminal. Alternatively, the mobile terminal may contact the operator directly (for example, in response to information contained on a SIM card in the terminal or in response to the user's configuration of the terminal) to cause the operator to open IKE negotiations with the second network node.
Preferably, the mobile wireless terminal is a cellular telephone or communicator, or a PDA, laptop computer, palmtop computer etc, having cellular telephone capabilities.
According to a second aspect of the present invention there is provided a gateway node of a mobile telecommunications network, the gateway node comprising: means for authenticating and identifying a mobile wireless terminal; means for obtaining a certificate for the mobile terminal, which certificate can be used to identify and authenticate the mobile terminal; and means for sending the certificate from the gateway node to the correspondent node, wherein the received certificate may be used by the correspondent node to identify and authenticate the mobile terminal for the purpose of establishing an IP connection between the terminal and the node.
Brief Description of the Drawings
Figure 1 illustrates schematically a communications system incorporating a corporate intranet, the Internet, and a Public Land Mobile Network (PLMN);
Figure 2 illustrates schematically the nodes involved in authenticating a mobile terminal to a corporate intranet gateway across the system of Figure 1; and
Figures 3 a and 3b show a flow diagram showing the steps involved in authenticating a mobile terminal to allow the transfer of IP data across the system of Figure 1.
Detailed Description of a Preferred Embodiment
Figure 1 illustrates a typical communications system in which a corporate intranet 1 is connected via a gateway (or "firewall") 2 to the Internet 3. A remote mobile terminal 4 such as a PDA with a cellular telephone "modem" may connect to the security gateway 2 via the internet 3 and a Public Land Mobile Network (PLMN) 5. In the following discussion, it is assumed that the PLMN is a GSM network. By using IPSec to control communications between the security gateway 2 and the mobile terminal 4 (and hence between the mobile terminal 4 and local hosts 6 connected to the intranet 1), a Virtual Private Network (VPN) may be established.
Figure 2 illustrates schematically the entities involved when a mobile terminal 4 requires authorisation to enter through a corporate intranet gateway 2. The sequence of events leading to a successful and secure connection is shown in Figures 3 a and 3b and is as follows:
1. The GSM mobile terminal 4 and Subscriber Identity Module (SIM) card to be inserted into the terminal are manufactured as normal. The SIM card includes a unique identifier such as an International Mobile Subscriber Identity (LMSI) or telephone number. Additional information may be stored in the SIM card, depending on how the authentication is to be performed.
Upon each attempt by the mobile terminal 4 to enter through the intranet gateway 2, the following steps take place:
2. The terminal 4 initiates an IKE negotiation with the intranet gateway 2. This attempt is observed by the operator's security gateway 8 which routes all traffic from mobile terminals. Rather than allowing the IKE communication from the mobile terminal 4 to continue, the gateway 8 determines that the negotiations should be handled by itself. This decision is communicated to the mobile terminal 4. It will be appreciated that for terminals which do not have this added value service enabled, the gateway 8 will remain transparent to IKE negotiations.
In an alternative system, it is possible for the mobile terminal 4 to contact the operator gateway 8, rather than attempting to open IKE negotiations directly with the intranet gateway 2. The address of the operator gateway 8 could be included on the SIM card at step 2 above, or the terminal 4 could be configured by the user. However, the interception of a direct IKE negotiation attempt is the preferred alternative because it requires no prior configuration of the terminal 4.
3. The terminal 4 runs GSM SIM-based authentication of IKE phase 1 with the operator's security gateway 8 according to the IETF draft proposal of Rinnemaa. This procedure identifies and authenticates the terminal 4 to the gateway 8 by reference to the Home Location Register (HLR) 9 of the network. Identification of the mobile terminal 4 is by way of the subscriber's IMSI or telephone number.
4. The operator's security gateway 8 authenticates itself to the terminal 4, to protect against rogue gateways. This can be performed using one of the following methods:
A shared secret authentication takes place using a secret previously agreed between the terminal 4 and the operator gateway 8. The secret could be stored on the SIM card of the terminal 4 (see step 2 above).
The terminal 4 is configured with the public key of the gateway 8 or of the CA 10 of all gateways (this could performed in step 2 above).
Step 4 completes the IKE phase 1 process between the mobile terminal 4 and the security gateway 8.
5. The operator's security gateway 8 determines the IP address of the corporate
* intranet gateway 2 from the destination address of the original IKE negotiation request made by the mobile terminal 4.
If the terminal 4 did not attempt a direct IKE negotiation with the corporate intranet gateway 2 as described in step 3 above, but initiated the request by contacting the operator's security gateway 8, then it will be necessary for the operator gateway 8 to determine the address of the corporate intranet gateway 2 by some other means. This may be, for example, by the use of pre-configured information in the operator gateway 8. Alternatively, the mobile terminal 4 could supply this information as part of the original request. The address of the corporate gateway 2 could be stored on the SIM card at step 2 above, or as part of the user configuration of the terminal 4, and forwarded to the operator gateway 8.
6. The security gateway 8 identifies a certificate for the mobile terminal 4 by mapping the terminal's identity (e.g. IMSI) to a database of certificates. These certificates have previously been obtained by the gateway 8 as a result of negotiations with a CA. Each certificate contains a public key for the terminal as well as the identity, i.e. telephone number, of the terminal. The certificate is "signed" by encryption with the private key of a private-public key pair belonging to the issuing CA. In some cases, the operator may itself act as a CA, in which case certificates may be generated by the operator (this could be done dynamically upon request by a subscriber).
7. The operator's security gateway 8 starts an IPsec/IKE Phase 1 negotiation with the corporate intranet gateway 2 using the identified certificate. This step (and steps 5 and 6) may occur simultaneously with step 3 above. The intranet gateway 2 knows the public key of the CA. The gateway 2 can therefore identify and authenticate the mobile terminal 4. The gateway 2 then proceeds to perform an authorization decision by, for example, checking the phone number of the mobile terminal against a list of allowed users. This list of allowed users is maintained in a local database (LDAP) 7.
In an alternative procedure, the operator 8 and the corporation maintaining the intranet gateway 2 have previously agreed the use of a special set of keys and CA parameters, effectively outsourcing normal PKI operations of the corporation 2 to the operator 8. Standard DCE mechanisms will then be used, the only required checks being the key checks and the verification that the certificate comes from the corporation's own CA (operated by the operator). No LDAP is required.
8. The operator gateway must then authenticate the corporate gateway, by either: using a pre-shared secret (i.e. shared between the terminal and the corporate gateway) or a public key stored in Step 1 at the terminal and later transported to the operator's gateway using a new IKE data element; or using a pre-shared secret or a public key agreed with the operator and the corporation beforehand (the preferred alternative).
Step 8 concludes the IKE Phase 1 process between the security gateway 8 and the corporate intranet gateway 2.
At the end of IKE Phase 1, the two communicating nodes have authenticated each other and have established a shared secret. In IKE phase 2, the cornmunicating nodes proceed to establish a pair of Security Associations (SAs). It is envisaged that IKE Phase 2 proceeds separately for both the mobile terminal to security gateway connection and for the security gateway to corporate gateway connection. Once the two pairs of SAs have been established, data can be carried securely between the mobile terminal 4 and the intranet gateway 2 with the security gateway performing any required translation. Alternatively, further SAs can be negotiated using the initial SA pairs.
In order to reduce the processing load on the security gateway 8, SA proposals (such as the encryption algorithm to be used) negotiated for one leg of the connection may be sent forward across the second leg. For example, SA proposals for the mobile terminal 4 to security gateway 8 connection may be forwarded to the intranet gateway 2. In this way, the same SA proposals may be used for both connection legs avoiding the need for any translation (e.g. between encryption algorithms). It may also be possible to carry out only a single IKE Phase 2 negotiation for the end to end connection between the mobile terminal 4 and the intranet gateway 2, avoiding the need for a separate Phase 2 negotiation for each connection leg.
It will be appreciated by the person of skill in the art that various modifications may be made to the embodiment described above without departing from the scope of the invention. For example, rather than conduct a new pair of IKE phase 1 procedures each time the mobile terminal seeks to access through the intranet gateway, the procedure may only be carried out the first time that such an access is sought, and regular time intervals thereafter (e.g. at 24 hour intervals). In another modification, the certificate identified by the security gateway may have a structure different from that described above. For example, the certificate may contain the mobile terminal ID and public key in unencrypted form. A hash function is applied to the ID and public key, and the result encrypted with the CA's private key to generate a signature.

Claims

CLAIMS:
1. A method of authenticating a mobile wireless terminal to a correspondent node for the purpose of establishing an IP connection between the terminal and the node, the method comprising: authenticating and identifying the mobile terminal to a gateway node of a mobile telecommunications network; at the gateway node, obtaining a certificate for the mobile terminal, which certificate can be used to identify and authenticate the mobile terminal; sending the certificate from the gateway node to the correspondent node; and at the correspondent node, using the received certificate to identify and authenticate the mobile terminal.
2. A method according to claim 1, wherein the gateway node is an operator-owned security gateway, and the operator gateway determines a public-private key pair on behalf of the mobile terminal, together with the certificate for the mobile terminal based on a mapping of a unique identifier of the terminal.
3. A method according to claim 1 or 2, wherein the certificate identified by the gateway is a public key certificate obtained from a certification authority (CA).
4. A method according to claim 3, wherein said certificate contains an identification of the mobile terminal.
5. A method according to claim 4, wherein said identification is a phone number of the mobile terminal.
6. A method according to claim 4 or 5, wherein the correspondent node determines whether or not to authorise access to the mobile terminal on the basis of said identifier.
7. A method according to any one of the preceding claims, wherein said steps of sending the certificate from the gateway node to the correspondent node and of using the received certificate to identify and authenticate the mobile terminal both form part of an IKE Phase 1 procedure.
8. A method according to any one of the preceding claims, wherein the step of authenticating the mobile terminal to the gateway node forms part of an IKE Phase 1 procedure which makes use of a SIM authentication procedure using the subscriber's
ΓMSI.
9. A method according to any one of the preceding claims, wherein, when the mobile terminal attempts to perform IKE with the correspondent node, this attempt is recognised by the operator gateway, causing the operator gateway to authenticate the mobile terminal to the correspondent node and handle IKE negotiations with the correspondent node on behalf of the mobile terminal.
10. A method according to any one of claims 1 to 8, wherein the mobile terminal contacts the operator directly to cause the operator to open IKE negotiations with the correspondent node.
11. A method according to any one of the preceding claims, wherein the mobile wireless terminal is a cellular telephone or communicator, or a PDA, laptop computer, palmtop computer etc, having cellular telephone capabilities.
12. A method of establishing a secure connection between a mobile wireless terminal and a correspondent node, the method comprising the steps of: authenticating the mobile wireless terminal to the correspondent node using the method of any one of the preceding claims; and authenticating the correspondent node to said gateway node of the mobile telecommunications network.
13. A method according to claim 12 and comprising conducting an IKE phase 2 negotiation between the mobile wireless terminal and the correspondent node to establish one or more IPSec SAs.
14. A gateway node of a mobile telecommunications network, the gateway node comprising: means for authenticating and identifying a mobile wireless terminal; means for obtaining a certificate for the mobile terminal, which certificate can be used to identify and authenticate the mobile terminal; and means for sending the certificate from the gateway node to the correspondent node, wherein the received certificate may be used by the correspondent node to identify and authenticate the mobile terminal for the purpose of establishing an IP connection between the terminal and the node.
PCT/EP2001/013704 2000-11-24 2001-11-19 Ipsec connections for mobile wireless terminals WO2002043427A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002229566A AU2002229566A1 (en) 2000-11-24 2001-11-19 Ipsec connections for mobile wireless terminals

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0028618A GB2369530A (en) 2000-11-24 2000-11-24 IP security connections for wireless authentication
GB0028618.7 2000-11-24

Publications (1)

Publication Number Publication Date
WO2002043427A1 true WO2002043427A1 (en) 2002-05-30

Family

ID=9903761

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2001/013704 WO2002043427A1 (en) 2000-11-24 2001-11-19 Ipsec connections for mobile wireless terminals

Country Status (3)

Country Link
AU (1) AU2002229566A1 (en)
GB (1) GB2369530A (en)
WO (1) WO2002043427A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005025174A1 (en) * 2003-09-04 2005-03-17 Nokia Corporation Location privacy in a communication system

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6986037B1 (en) * 2000-04-07 2006-01-10 Sendmail, Inc. Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent
CN1215386C (en) * 2002-04-26 2005-08-17 St微电子公司 Method and hardware architecture for controlling a process or for processing data based on quantum soft computing
AU2003237252A1 (en) 2002-06-06 2003-12-22 Thomson Licensing S.A. Broker-based interworking using hierarchical certificates
DE102004045147A1 (en) 2004-09-17 2006-03-23 Fujitsu Ltd., Kawasaki A setting information distribution apparatus, method, program and medium, authentication setting transfer apparatus, method, program and medium, and setting information receiving program
GB2423448B (en) * 2005-02-18 2007-01-10 Ericsson Telefon Ab L M Host identity protocol method and apparatus
US20070149170A1 (en) * 2005-12-23 2007-06-28 Sony Ericsson Mobile Communications Ab Sim authentication for access to a computer/media network
BRPI0802251A2 (en) * 2008-07-07 2011-08-23 Tacito Pereira Nobre system, method and device for authentication in electronic relationships

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999026124A1 (en) * 1997-11-19 1999-05-27 Telefonaktiebolaget Lm Ericsson (Publ) Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network
WO1999027678A2 (en) * 1997-11-26 1999-06-03 Nokia Networks Oy Security of data connections
US6061346A (en) * 1997-01-17 2000-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Secure access method, and associated apparatus, for accessing a private IP network
WO2000062484A1 (en) * 1999-04-08 2000-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Mobile internet access

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI105966B (en) * 1998-07-07 2000-10-31 Nokia Networks Oy Authentication in a telecommunications network
GB2342817A (en) * 1998-10-16 2000-04-19 Nokia Mobile Phones Ltd Secure session setup based on wireless application protocol
MXPA02002018A (en) * 1999-08-31 2002-09-18 Ericsson Telefon Ab L M Gsm security for packet data networks.

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061346A (en) * 1997-01-17 2000-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Secure access method, and associated apparatus, for accessing a private IP network
WO1999026124A1 (en) * 1997-11-19 1999-05-27 Telefonaktiebolaget Lm Ericsson (Publ) Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network
WO1999027678A2 (en) * 1997-11-26 1999-06-03 Nokia Networks Oy Security of data connections
WO2000062484A1 (en) * 1999-04-08 2000-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Mobile internet access

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005025174A1 (en) * 2003-09-04 2005-03-17 Nokia Corporation Location privacy in a communication system
US7426746B2 (en) 2003-09-04 2008-09-16 Nokia Corporation Location privacy in a communication system

Also Published As

Publication number Publication date
GB0028618D0 (en) 2001-01-10
GB2369530A (en) 2002-05-29
AU2002229566A1 (en) 2002-06-03

Similar Documents

Publication Publication Date Title
US11283772B2 (en) Method and system for sending a message through a secure connection
EP2561663B1 (en) Server and method for providing secured access to services
US20040158716A1 (en) Authentication and authorisation based secure ip connections for terminals
US6965992B1 (en) Method and system for network security capable of doing stronger encryption with authorized devices
EP1374533B1 (en) Facilitating legal interception of ip connections
US20090063851A1 (en) Establishing communications
US20070006296A1 (en) System and method for establishing a shared key between network peers
EP1540878A1 (en) Linked authentication protocols
WO2021068777A1 (en) Methods and systems for internet key exchange re-authentication optimization
US7895648B1 (en) Reliably continuing a secure connection when the address of a machine at one end of the connection changes
WO2002043427A1 (en) Ipsec connections for mobile wireless terminals
Eronen et al. An Extension for EAP-Only Authentication in IKEv2
KR20070022268A (en) Methods and apparatus managing access to virtual private network for portable device without vpn client
Xenakis et al. Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
CN112398805A (en) Method for establishing communication channel between client machine and service machine
Ekström Securing a wireless local area network: using standard security techniques
JP2022500889A (en) Data communication network security method
Ramezani Coordinated Robust Authentication In Wireless Networks
Eronen et al. RFC 5998: An Extension for EAP-Only Authentication in IKEv2

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP