Security considerations for the LTE of UMTS
First Claim
Patent Images
1. A method for providing message protection, the method comprising:
- generating, by a transmitter, a ciphered message based upon at least one counter, a message, and a ciphering key;
generating, by the transmitter, an unciphered message authentication code (MAC) based upon the at least one counter, an integrity protection key, and the ciphered message; and
transmitting, by the transmitter, security protected data comprising the unciphered MAC and the ciphered message over a transmission medium,wherein the generation of the ciphered message and the generation of the unciphered MAC occur independently, andwherein the ciphering key and the integrity protection key are generated using authentication parameters including a random challenge and an authentication token.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for providing message protection includes generating a ciphered message based upon a first counter, a message, and a ciphering key. The method further includes generating an unciphered message authentication code (MAC) based upon the first counter, an integrity protection key, and either the message or the ciphered message, and transmitting security protected data, which includes the MAC and the ciphered message, over a transmission medium.
-
Citations
14 Claims
-
1. A method for providing message protection, the method comprising:
-
generating, by a transmitter, a ciphered message based upon at least one counter, a message, and a ciphering key; generating, by the transmitter, an unciphered message authentication code (MAC) based upon the at least one counter, an integrity protection key, and the ciphered message; and transmitting, by the transmitter, security protected data comprising the unciphered MAC and the ciphered message over a transmission medium, wherein the generation of the ciphered message and the generation of the unciphered MAC occur independently, and wherein the ciphering key and the integrity protection key are generated using authentication parameters including a random challenge and an authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A transmitter operable in a communication network, the transmitter comprising:
-
a processor for providing message protection operations, wherein the processor is configured to; generate a ciphered message based upon at least one counter, a message, and a ciphering key; and generate an unciphered message authentication code (MAC) based upon the at least one counter, an integrity protection key, and the ciphered message; and a transceiver configured to transmit security protected data comprising the ciphered MAC and the ciphered message over a transmission medium, wherein the processor is further configured to generate the ciphered message and to generate the unciphered MAC independently, and wherein the ciphering key and the integrity protection key are generated using authentication parameters including a random challenge and an authentication token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification