FIELD: physics; communications.
SUBSTANCE: present invention relates to data encryption. At least one access key (BAK-I), sent from the service network node (DN) and at least one dispatched sequence value (SEQ) are stored on the identification card (UICC) of the communication terminal device (MS). The authenticity value (MAC-I) is calculated in the service network node and together with service data and the next sequence value (nSEQ) is sent to the MS. When data are received, the received MAC-I is compared with the calculated authenticity value (SD-MAC-I), calculated on UICC. On the UICC, nSEQ is then compared with SEQ already stored on the UICC, and only if there is a positive result of comparing both authenticity values (MAC-I/SD-MAC-I) and both sequence values (SEQ/nSEQ), the session key generated for the UICC for decrypting service data is sent to the MS.
EFFECT: more efficient protection of session keys.
12 cl, 5 dwg
Title |
Year |
Author |
Number |
PROTECTED REGISTRATION FOR MULTIMEDIA BROADCAST MULTICAST SERVICE (MBMS) |
2004 |
- Grilli Franchesko
- Kasachija Lorentso
- Sehmpl Dzhejms
- Agashe Parag A.
|
RU2363110C2 |
EXPANSION OF SIGNALING COMMUNICATIONS PROTOCOL |
2005 |
|
RU2384018C2 |
DEVICE AND METHOD FOR SECURED RADIO TRANSMISSION SYSTEM |
2004 |
- Rouz Gregori Dzh.
- Sehmpl Dzhejms
- Kvik Roj Franklin
|
RU2419223C2 |
METHOD, DEVICE AND SYSTEM FOR UPDATING A BOND KEY IN A COMMUNICATION NETWORK FOR ENCODED COMMUNICATION WITH PROVISION APPLICATIONS |
2020 |
- Yu, Shilin
- Tsaj, Tsziyan
- Lyu, Yujtsze
- Pen, Tszin
- Yuj, Vantao
- Lin, Chzhaotszi
- Mao, Yujsin
- Lyu, Tszyankhua
|
RU2801267C1 |
METHOD OF CRYPTOGRAPHIC KEY FORMING AND DISTRIBUTION IN MOBILE COMMUNICATION SYSTEM AND CORRESPONDING MOBILE COMMUNICATION SYSTEM |
2004 |
- Khorn Gjunter
- Kresel'Berg Dirk
|
RU2335866C2 |
METHOD OF RECEIVING ACCESS CONTROL CLIENT, METHOD OF MODIFYING DEVICE OPERATING SYSTEM, WIRELESS DEVICE AND NETWORK DEVICE |
2011 |
- Shell Stefan V.
- Matias Arun Dzh.
- Fon Khauk Dzherrol'D
- Khaggerti Devid T.
- Maklaflin Kevin
- Tszjuan Behn'-Khehn'
- Li Li
|
RU2507710C2 |
METHOD FOR USING A PAIR OF OPEN KEYS IN END DEVICE FOR AUTHENTICATION AND AUTHORIZATION OF TELECOMMUNICATION NETWORK USER RELATIVELY TO NETWORK PROVIDER AND BUSINESS PARTNERS |
2001 |
- Kjullar Jorge
- Markhefer Mikhel'
|
RU2282311C2 |
METHOD AND SYSTEM FOR GSM-AUTHENTICATION DURING ROAMING IN WIRELESS LOCAL NETWORKS |
2002 |
- Shtadel'Mann Toni
- Kauts Mikhel'
|
RU2295200C2 |
METHOD AND SYSTEM FOR SETTLEMENTS BASED ON GSM STANDARD FOR ROAMING IN WIRELESS LOCAL NETWORKS |
2002 |
- Konn Dzheremi Richard
- Shtadel'Mann Toni
- Kauts Mikhel'
|
RU2305907C2 |
METHOD FOR DETECTING COPIED INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI) CODE IN MOBILE COMMUNICATION NETWORK AND MOBILE COMMUNICATION NETWORK COMPONENT |
1998 |
|
RU2204219C2 |