Method for providing a symmetric key for protecting a key management protocol
1 Assignment
0 Petitions
Accused Products
Abstract
Cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device. A first symmetric key of the subscriber device and the provider device is inserted in a symmetric key protection mechanism of a network protocol of a control layer to establish a communication session between the subscriber device and the provider device. A first time-variable parameter is transmitted from the provider device to the subscriber device. A second symmetric key for protecting the key management protocol is calculated by both the provider device and the subscriber device using a defined function depending at least on the first symmetric key and the first time-variable parameter.
-
Citations
29 Claims
-
1-15. -15. (canceled)
-
16. A method for providing a symmetric key for protecting a key management protocol, by which cryptographic material is generated for a protocol for encrypted transmission of media data between user equipment and provider equipment, comprising:
-
providing a first symmetric key to the user equipment and the provider equipment, the first symmetric key used in a protection mechanism of a network protocol of a control layer based on symmetric keys to establish a communication session between the user equipment and the provider equipment; transmitting a first time-variable parameter from the provider equipment to the user equipment; deriving a second time-variable parameter respectively by the user equipment and the provider equipment from the first time-variable parameter; computing a second symmetric key for protection of the key management protocol by the provider equipment using the second time-variable parameter and a predefined function depending on at least the first symmetric key and the first time-variable parameter; and computing the second symmetric key by the user equipment using the second time-variable parameter and the predefined function depending on at least the first symmetric key and the first time-variable parameter. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for encryption of media data between user equipment and provider equipment, comprising:
-
providing, to the user equipment and the provider equipment, a first symmetric key used in a protection mechanism of a network protocol of a control layer based on symmetric keys to establish a communication session between the user equipment and the provider equipment; transmitting a first time-variable parameter from the provider equipment to the user equipment; computing, by the provider equipment, a second symmetric key for protection of the key-management protocol, using a predefined function depending on at least the first symmetric key and the first time-variable parameter; and computing, by the user equipment, the second symmetric key based on the predefined function depending on at least the first symmetric key and the first time-variable parameter; encrypting, by the user equipment or provider equipment, the media data depending on the second symmetric key to produce encrypted media data; transmitting the encrypted media data; receiving the encrypted media data by the provider equipment or user equipment; and decrypting, by the provider equipment or the user equipment, the encrypted media data using the second symmetric key provided.
-
Specification