Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system
First Claim
1. A method for creating and distributing cryptographic keys in a mobile radio system, wherein the mobile radio system has at least one mobile radio terminal, a first computer, a computer of a home communications network and a second computer, the at least one mobile radio terminal and the computer of the home communications network including authentication key materials resulting from an authentication, the method comprising:
- creating a first cryptographic key and a second cryptographic key by the at least one mobile radio terminal and the computer of the home communications network using the authentication key materials, wherein the first cryptographic key and the second cryptographic key are created such that no inference can be made from the first cryptographic key as to the second cryptographic key,no inference can be made from the second cryptographic key as to the first cryptographic key, andno inference can be made from the first cryptographic key or from the second cryptographic key as to the authentication key materials;
transmitting the first cryptographic key from one or both of the at least one mobile terminal and the computer of the home communications network to the first computer; and
transmitting the second cryptographic key from one or both of the at least one mobile radio terminal and the computer of the home communications network to the second computer, wherein the first computer is a first application server computer and the second computer is a second application server computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A first cryptographic key (318) and a second cryptographic key (322) are created by a mobile radio terminal (103) and by a computer of the home communications network (108, 109) by using authentication key materials (312). The first cryptographic key (318) is transmitted to the computer of the visited communications network (113), and the second cryptographic key (322) is transmitted to an application server computer (106, 107).
31 Citations
14 Claims
-
1. A method for creating and distributing cryptographic keys in a mobile radio system, wherein the mobile radio system has at least one mobile radio terminal, a first computer, a computer of a home communications network and a second computer, the at least one mobile radio terminal and the computer of the home communications network including authentication key materials resulting from an authentication, the method comprising:
-
creating a first cryptographic key and a second cryptographic key by the at least one mobile radio terminal and the computer of the home communications network using the authentication key materials, wherein the first cryptographic key and the second cryptographic key are created such that no inference can be made from the first cryptographic key as to the second cryptographic key, no inference can be made from the second cryptographic key as to the first cryptographic key, and no inference can be made from the first cryptographic key or from the second cryptographic key as to the authentication key materials; transmitting the first cryptographic key from one or both of the at least one mobile terminal and the computer of the home communications network to the first computer; and transmitting the second cryptographic key from one or both of the at least one mobile radio terminal and the computer of the home communications network to the second computer, wherein the first computer is a first application server computer and the second computer is a second application server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A mobile radio system, comprising:
-
at least one mobile radio terminal situated in a visited communications network, in which authentication key material resulting from an authentication are stored; a first computer of the visited communications network, wherein the first computer is a first application server computer; a computer of a home communications network in which computer are stored the same authentication key materials, resulting form the authentication, as are stored in the at least one mobile radio terminal; and at least one second computer, wherein the at least one mobile radio terminal and the computer of the home communications network each have a crypto unit for creating a first cryptographic key and a second cryptographic key by using the authentication key materials, wherein one or both of the at least one mobile radio terminal and the computer of the home communications network comprise a transmitter which transmits the first cryptographic key to the first computer, and wherein one or both of the at least one mobile radio terminal and the computer of the home communications network comprise a transmitter which transmits the second cryptographic key to the second computer, wherein the first cryptographic key and the second cryptographic key are created such that no inference can be made from the first cryptographic key as to the second cryptographic key, no inference can be made from the second cryptographic key as to the first cryptographic key, and no inference can be made from the first cryptographic key or from the second cryptographic key as to the authentication key materials; wherein the first computer of the visited communications network comprises memory for storing the first cryptographic key, and wherein the second computer is an application server computer comprising memory for storing the second cryptographic key.
-
Specification