Generating asymmetric keys in a telecommunications system
First Claim
Patent Images
1. A method, comprising:
- generating a first seed value in a user terminal and a second seed value in at least one network node, such that the first and the second seed values are identical, wherein the at least one network node services the user terminal, and wherein a key pair comprises a public key and a private key; and
generating, based on said first seed value, a first key pair in the user terminal, and, based on the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical,wherein said first and second seed values are generated using at least one of a cipher key and an integrity key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for creating a key pair in a telecommunications system comprises a user terminal and at least one network node serving the user terminal. In the method, upon a successful user authentication, a first seed value is composed in the user terminal and a second seed value is composed in the network node, such that the seed values are identical. Based on the seed values, respective public/private key pairs are generated, such that the generated public/private key pair in the user terminal and the generated public/private key pair in the network node are identical.
-
Citations
28 Claims
-
1. A method, comprising:
-
generating a first seed value in a user terminal and a second seed value in at least one network node, such that the first and the second seed values are identical, wherein the at least one network node services the user terminal, and wherein a key pair comprises a public key and a private key; and generating, based on said first seed value, a first key pair in the user terminal, and, based on the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
generating a first seed value in a user terminal and a second seed value in at least one network node, such that the first and the second seed values are identical, wherein the at least one network node services the user terminal, and wherein a key pair comprises a public key and a private key; and generating, based on said first seed value, a first key pair in the user terminal, and, based on the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, wherein said first and second seed values are generated using a cipher key of a second generation network.
-
-
8. A method, comprising:
-
generating a first seed value in a user terminal and a second seed value in at least one network node, such that the first and the second seed values are identical, wherein the at least one network node services the user terminal, and wherein a key pair comprises a public key and a private key; generating, based on said first seed value, a first key pair in the user terminal, and, based on the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, incrementing an authentication counter stored in the user terminal, indicating a successful authentication of the user terminal, thus triggering a generation of the first and second key pairs through seed values in the user terminal; and incrementing an authentication counter stored in the at least one network node, indicating a successful authentication of the user terminal, thus triggering the generation of the first and second key pairs through seed values in the at least one network node. - View Dependent Claims (9)
-
-
10. A system, comprising:
-
a user terminal; and at least one network node serving the user terminal; wherein the system is configured to generate a first seed value in a user terminal and a second seed value in the at least one network node, such that the first and the second seed values are identical; and generate, on the basis of the first seed value, a first key pair in the user terminal, and, on the basis of the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (11, 12, 13)
-
-
14. A system, comprising:
-
a user terminal; and at least one network node serving the user terminal; wherein the system is configured to generate a first seed value in a user terminal and a second seed value in the at least one network node, such that the first and the second seed values are identical; and generate, on the basis of the first seed value, a first key pair in the user terminal, and, on the basis of the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, wherein the system is configured to generate said first and second seed values using a cipher key of a second generation network.
-
-
15. An apparatus, comprising:
-
a first routine configured to compose a second seed value, wherein the second seed value is identical to a first seed value composed in a user terminal that is serviced by the apparatus, wherein a key pair comprises a public key and a private key; and a second routine configured to generate, based on the second seed value, a second key pair wherein the second key pair is identical to a first key pair generated by the user terminal using the first seed value, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. An apparatus, comprising:
-
a first routine configured to generate a first seed value, wherein the first seed value is identical to a second seed value composed in a network node configured to service the apparatus, wherein a key pair comprises a public key and a private key; and a second routine configured to generate, based on the first seed value, a first key pair, wherein the first key pair is identical to a second key pair generated by the network node using the second seed value, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (22)
-
-
23. An apparatus, comprising:
-
means for generating a second seed value, wherein the second seed value is identical to a first second seed value generated in the user terminal that is serviced by the apparatus, wherein a key pair comprises a public key and a private key; and means for generating, based on the second seed value, a second key pair, wherein the second key pair is identical to a first key pair generated by the user terminal using the first seed value, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (24, 25)
-
-
26. An apparatus, comprising:
-
means for generating a first seed value, wherein the first seed value is identical to a second seed value composed in a network node configured to service the apparatus, wherein a key pair comprises a public key and a private key; and means for generating, based on the first seed value, a first key pair, wherein the first key pair is identical to a second key pair generated by the network node using the second seed value, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key. - View Dependent Claims (27)
-
-
28. A computer program embodied on a computer-readable medium, the computer program configured to control a processor to perform operations comprising:
-
generating a first seed value in a user terminal and a second seed value in at least one network node, such that the first and the second seed values are identical, wherein the at least one network node services the user terminal, and wherein a key pair comprises a public key and a private key; and generating, based on said first seed value, a first key pair in the user terminal, and, based on the second seed value, a second key pair in said at least one network node, such that the first and the second key pairs are identical, wherein said first and second seed values are generated using at least one of a cipher key and an integrity key.
-
Specification