Nec corporation (20240244425). COMMUNICATION TERMINAL, CORE NETWORK DEVICE, CORE NETWORK NODE, NETWORK NODE, AND KEY DERIVING METHOD simplified abstract

From WikiPatents
Jump to navigation Jump to search

COMMUNICATION TERMINAL, CORE NETWORK DEVICE, CORE NETWORK NODE, NETWORK NODE, AND KEY DERIVING METHOD

Organization Name

nec corporation

Inventor(s)

Hironori Ito of Tokyo (JP)

Sivakamy Lakshminarayanan of Chennai (IN)

Anand Raghawa Prasad of Tokyo (JP)

Sivabalan Arumugam of Chennai (IN)

Sheeba Backia Mary Baskaran of Chennai (IN)

COMMUNICATION TERMINAL, CORE NETWORK DEVICE, CORE NETWORK NODE, NETWORK NODE, AND KEY DERIVING METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240244425 titled 'COMMUNICATION TERMINAL, CORE NETWORK DEVICE, CORE NETWORK NODE, NETWORK NODE, AND KEY DERIVING METHOD

The abstract of this patent application describes a communication terminal that can maintain a high level of security when establishing multiple connections via 3GPP access and non-3GPP access.

  • Communication unit communicates with gateway devices via untrusted non-3GPP access.
  • Key derivation unit derives a second security key for messages with gateway devices from a first security key for messages with core network devices.

Potential Applications: - Telecommunications industry for secure communication. - IoT devices requiring secure connections. - Military and government communications.

Problems Solved: - Preventing security vulnerabilities when establishing multiple connections. - Ensuring data integrity and confidentiality in communication.

Benefits: - Enhanced security for communication terminals. - Seamless integration of different network access types. - Protection against unauthorized access and data breaches.

Commercial Applications: Title: Secure Communication Terminal for Various Industries This technology can be used in telecommunications, IoT, and government sectors to ensure secure and reliable communication, leading to increased trust and confidence in data exchange.

Prior Art: Research existing patents related to secure communication terminals and key derivation methods in the telecommunications field to understand the current state of the art.

Frequently Updated Research: Stay updated on advancements in secure communication protocols, key management systems, and network security to enhance the capabilities of the communication terminal.

Questions about the Technology: 1. How does the key derivation unit ensure the security of messages transmitted via different protocols? The key derivation unit uses a first security key for communication with core network devices and derives a second security key for communication with gateway devices, ensuring secure message transmission.

2. What are the potential risks associated with using untrusted non-3GPP access for communication? Untrusted non-3GPP access may expose the communication terminal to security threats such as unauthorized access, data interception, and malicious attacks.


Original Abstract Submitted

a communication terminal capable of preventing a reduction in security level that is caused at the time of establishing multiple connections via 3gpp access and non-3gpp access. a communication terminal according to the present disclosure includes: a communication unit configured to communicate with gateway devices disposed in a preceding stage of a core network device via an untrusted non-3gpp access; and a key derivation unit configured to derive a second security key used for security processing of a message transmitted using a defined protocol with the gateway device, from a first security key used for security processing of a message transmitted using a defined protocol with the core network device.