PROTECTION OF PRIVACY IN WIRELESS TELECOMMUNICATION NETWORKS

    公开(公告)号:US20200322794A1

    公开(公告)日:2020-10-08

    申请号:US16303833

    申请日:2016-05-30

    Abstract: A method of protecting the exchange of privacy-sensitive data in a wireless communication network, the method including generating and providing a public cryptographic key to a first entity, possessing the data to be sent to the network through a wireless connection; generating and providing a private secret cryptographic key to a second entity, being the intended recipient of the data, the private key being bound to the public key and being associated to privacy support context information to identify the network; having the network send to the first entity respective wireless network privacy support context information; having the first entity receive the information and encrypt the data using the public key and the received information to obtain protected, encrypted privacy-sensitive data; having the first entity send to the second entity through the network the encrypted data; and having the second entity decrypt the encrypted data exploiting the private key.

    PROTECTING SIGNALING MESSAGES IN HOP-BY-HOP NETWORK COMMUNICATION LINK

    公开(公告)号:US20210243173A1

    公开(公告)日:2021-08-05

    申请号:US17053443

    申请日:2019-04-24

    Abstract: In method of protecting signaling messages in a hop-by-hop network communication link between a source node and a destination node, a source node public digital signature verification key and a respective source node private digital signature key associated with said public digital signature verification key are provided to the source node. The source node public digital signature verification key associated with the source node private digital signature key is also provided to the destination node. The source node builds a message including a sequence of Information Elements, and calculates, for each Information Element, an Information Element hash value. The source node also calculates a sequence hash value of a concatenation of the calculated Information Element hash values, and generates a source node digital signature by digitally signing the calculated sequence hash value. An intermediate node receives and forwards the signaling message to the destination node.

Patent Agency Ranking