TECHNIQUES FOR SECURE CHANNELIZATION BETWEEN UICC AND A TERMINAL
First Claim
1. A method for use by a wireless transmit/receive unit (WTRU) for establishing secure communication, the method comprising:
- establishing a temporary secure channel between an internal key center (IKC) within the WTRU and a UMTS Integrated Circuit Card (UICC);
establishing a secure channel between the UICC and the IKC by performing a GBA_U process and a local-key set-up process over the established temporary secure channel.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is related to a wireless communication system. 3G UMTS mobile phone systems rely on a protected smart card called the UMTS integrated circuit card (UICC) that provides UMTS subscriber identity module (USIM) applications as a basis or root of various security measures protecting the communication path between the 3G mobile terminal and the UMTS wireless network (or UTRAN). Disclosed is a method by which the UICC exchanges information with a terminal, such as an Internal Key Center (IKC 1250) and a Bootstrapping Server Function (BSF 1270) enables a procedure where multiple local keys specific to applications and Network Application Functions (NAFs) (Ks_local) are used for authentication and to encrypt and decrypt messages.
187 Citations
21 Claims
-
1. A method for use by a wireless transmit/receive unit (WTRU) for establishing secure communication, the method comprising:
-
establishing a temporary secure channel between an internal key center (IKC) within the WTRU and a UMTS Integrated Circuit Card (UICC); establishing a secure channel between the UICC and the IKC by performing a GBA_U process and a local-key set-up process over the established temporary secure channel. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A wireless transmit/receive unit (WTRU) configured to establish secure communication, the WTRU comprising:
an internal key center (IKC) configured to establish a temporary secure channel a UMTS Integrated Circuit Card (UICC), and to establish a secure channel between the UICC and the bootstrap server function (BSF) by performing a GBA_U process and a local-key set-up process over the established temporary secure channel. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A method employed by an Internal Key Center (IKC) for a secure communication, the method comprising:
-
establishing a first secured tunnel with a UMTS Integrated Circuit Card (UICC); establishing a second secured tunnel with a bootstrap server function (BSF); and providing security association information for at least two network applications functions to the UICC using said first and second tunnels. - View Dependent Claims (14, 15)
-
-
16. A method, for use by a wireless transmit/receive unit (WTRU) including an internal key center (IKC), for establishing secure local keys, the method comprising:
-
determining whether a valid key exists on a UMTS Integrated Circuit Card (UICC), and if so retrieving a bootstrapping transaction identifier (B-TID) and at least one network application function identifier (NAF-ID) from the UICC; sending an application request for keys to a bootstrap server function (BSF); receiving an application response including at least one key; generating a counter limit and deriving local keys from related parameter for the at least one NAF; sending a application request for key establishment to the UICC; receiving local deviation response indicating successful verification of the local keys; and storing local keys and all related parameters in the IKC. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification