HOME NODE-B APPARATUS AND SECURITY PROTOCOLS
First Claim
Patent Images
1. A home node B/home evolved node B (H(e)NB), comprising:
- a trusted environment (TrE);
H(e)NB functional modules; and
interfaces between the TrE and H(e)NB functional modules configured to provide multiple levels of security,wherein the TrE is configured to interact with the H(e)NB functional modules to provide security and authentication,wherein security and authentication includes at least one of TrE or H(e)NB authentication and conditional hosting party authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A Home Node B or Home evolved Node B (HN(e)B) apparatus and methods are disclosed. The HN(e)B includes a Trusted Environment (TrE) and interfaces including unprotected interfaces, cryptographically protected interfaces, and hardware protected interfaces. The H(e)NB includes security/authentication protocols for communication between the H(e)NB and external network elements, including a Security Gateway (SGW).
40 Citations
35 Claims
-
1. A home node B/home evolved node B (H(e)NB), comprising:
-
a trusted environment (TrE); H(e)NB functional modules; and interfaces between the TrE and H(e)NB functional modules configured to provide multiple levels of security, wherein the TrE is configured to interact with the H(e)NB functional modules to provide security and authentication, wherein security and authentication includes at least one of TrE or H(e)NB authentication and conditional hosting party authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for authenticating a home nodeB/home evolved node B (H(e)NB) with a network, comprising:
-
initiating secure access to the network; receiving a first requirement designating one of device authentication or device authentication and hosting party authentication; receiving a second requirement designating one of certification based authentication or extensible authentication protocol-authentication and key agreement (EAP-AKA) authentication; responding with a first parameter supportive of one of device authentication or device authentication and hosting party authentication; responding with a second parameter supportive of one of certification based authentication or EAP-AKA authentication; and performing authentication using the first requirement and the second requirement on a condition that the first requirement and the second requirement matches the first parameter and the second parameter. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method for authenticating a home nodeB/home evolved node B (H(e)NB) with a network, comprising:
-
securely storing H(e)NB location information in a Trusted Environment (TrE); and securely sending the stored H(e)NB location information to the network via the TrE. - View Dependent Claims (34, 35)
-
Specification