Konidala et al., 2004 - Google Patents
A secure and privacy enhanced protocol for location-based services in ubiquitous societyKonidala et al., 2004
View PDF- Document ID
- 18309352550702042653
- Author
- Konidala D
- Yeun C
- Kim K
- Publication year
- Publication venue
- IEEE Global Telecommunications Conference, 2004. GLOBECOM'04.
External Links
Snippet
This paper focuses on one of the future applications and services area of mobile communications. Mobile devices like mobile phones and PDAs would very soon allow us to interact with other smart devices around us, thus supporting a ubiquitous society. There …
- 238000000034 method 0 abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
- H04M1/72527—With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/04—Network-specific arrangements or communication protocols supporting networked applications adapted for terminals or networks with limited resources or for terminal portability, e.g. wireless application protocol [WAP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7114175B2 (en) | System and method for managing network service access and enrollment | |
CN1701295B (en) | Method and system for a single-sign-on access to a computer grid | |
KR100501095B1 (en) | Terminal communication system | |
Isaac et al. | A lightweight secure mobile payment protocol for vehicular ad-hoc networks (VANETs) | |
KR20090089394A (en) | Secure password distribution to a client device of a network | |
US20050209975A1 (en) | System, method and computer program product for conducting a secure transaction via a network | |
CN104012131A (en) | Apparatus and method for performing over-the-air identity provisioning | |
Konidala et al. | A secure and privacy enhanced protocol for location-based services in ubiquitous society | |
Tatly et al. | Security challenges of location-aware mobile business | |
Al-Hamadi et al. | Distributed lightweight kerberos protocol for mobile agent systems | |
EP1437024B1 (en) | Method and arrangement in a communications network | |
KR100501172B1 (en) | System and Method for Status Management of Wireless Certificate for Wireless Internet and Method for Status Verification of Wireless Certificate Using The Same | |
Téllez Isaac et al. | Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks | |
KR20030005986A (en) | Method for the process of certification using mobile communication devices with the function of wireless certification(digital signature) | |
Pashalidis et al. | Using GSM/UMTS for single sign-on | |
KR100974496B1 (en) | Management system for certificate of authentication and method thereof | |
Francis et al. | A location based security framework for authenticating mobile phones | |
RU2282311C2 (en) | Method for using a pair of open keys in end device for authentication and authorization of telecommunication network user relatively to network provider and business partners | |
KR100697344B1 (en) | Method for single-sign-on in wired and wireless network environment, and system for the same | |
DIVYAN et al. | A secure and privacy enhanced location-based service transaction protocol in ubiquitous computing environment | |
Markovski et al. | Application level security of mobile communications | |
KR200375171Y1 (en) | Mobile Communication Devices for Using Unique IP Address as Certification Information | |
Kawada | Authentication services in mobile networks | |
Wen et al. | The impact of wireless application protocol (WAP) on m-commerce security | |
Venkatraman et al. | Trust and security realization for mobile users in gsm cellular networks |