Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHODS AND SYSTEMS FOR OPERATING A SECURE MOBILE DEVICE
Document Type and Number:
WIPO Patent Application WO/2015/036773
Kind Code:
A3
Abstract:
Method and apparatus for communicating with a machine to machine, M2M, device comprising: deriving at a M2M device using generic bootstrapping architecture, GBA, a first key. Sending a second key to the M2M device protected using the first key, wherein the second key is different to the first key. Sending protected data to the M2M device, wherein the protected data is verifiable by the M2M device using the second key.

Inventors:
BONE NICK (GB)
SNAPE TIM (GB)
BENTO JORGE (GB)
PRABDIAL YAKEEN (GB)
Application Number:
PCT/GB2014/052768
Publication Date:
June 11, 2015
Filing Date:
September 12, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VODAFONE IP LICENSING LTD (GB)
International Classes:
H04L29/08; G06F9/44; G06F9/4401; H04L12/04; H04L29/06; H04W4/14; H04W4/50; H04W4/70; H04W12/02; H04W28/08; H04W80/06; H04W88/02; H04W88/06
Domestic Patent References:
WO2010102259A22010-09-10
WO2013120225A12013-08-22
WO2007042345A12007-04-19
WO2011085810A12011-07-21
WO2014165747A12014-10-09
Foreign References:
US7069452B12006-06-27
US20050120106A12005-06-02
US20070248232A12007-10-25
DE102010010760A12011-09-15
Other References:
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Security aspects of Machine-Type Communications; (Release 11)", 13 July 2012 (2012-07-13), XP050685307, Retrieved from the Internet [retrieved on 20120713]
EXALTED: "WP5 - Security, Authentication & Provisioning. Deliverable 5.1 Security and Provisioning Solutions", 29 February 2012 (2012-02-29), XP055161176, Retrieved from the Internet [retrieved on 20150112]
N. ASOKAN ET AL: "Applicability of identity-based cryptography for disruption-tolerant networking", PROCEEDINGS OF THE 1ST INTERNATIONAL MOBISYS WORKSHOP ON MOBILE OPPORTUNISTIC NETWORKING , MOBIOPP '07, 1 January 2007 (2007-01-01), New York, New York, USA, pages 52, XP055181615, ISBN: 978-1-59-593688-2, DOI: 10.1145/1247694.1247705
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS) media plane security (Release 10)", 29 June 2012 (2012-06-29), XP050905073, Retrieved from the Internet [retrieved on 20120629]
"oneM2M-TR-0002-Architecture_Analysis_Part_1-V-0.2.0 Architecture Analysis - Part 1: Analysis of architectures proposed for consideration by oneM2M", 28 July 2013 (2013-07-28), XP055154643, Retrieved from the Internet [retrieved on 20141124]
GEMALTO: "Corrections and Clarifications in Security text;M2M(12)19_121_CR_TS_102_690_R2__Removal_of_Kma_Alignment_of_Clause_5_with_", ETSI DRAFT; M2M(12)19_121_CR_TS_102_690_R2__REMOVAL_OF_KMA_ALIGNMENT_OF_CLAUSE_5_WITH_, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE (ETSI), 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS ; FRANCE, vol. SmartM2M, 22 March 2012 (2012-03-22), pages 1 - 32, XP014214112
"Lightweight Machine to Machine Technical Specification ; OMA-TS-LightweightM2M-V1_0-20130912-D_RM", no. 1.0, 12 September 2013 (2013-09-12), pages 1 - 101, XP064164725, Retrieved from the Internet [retrieved on 20130912]
Attorney, Agent or Firm:
BOULT WADE TENNANT et al. (70 Grays Inn RoadLondon,Greater London, WC1X 8BT, GB)
Download PDF: