US 11,722,473 B2
Communication between a communication device and a network device
Mats Näslund, Bromma (SE); Bengt Sahlin, Espoo (FI); Karl Norrman, Stockholm (SE); and Jari Arkko, Kauniainen (FI)
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), Stockholm (SE)
Filed by Telefonaktiebolaget L M Ericsson (publ), Stockholm (SE)
Filed on Feb. 23, 2021, as Appl. No. 17/182,553.
Application 17/182,553 is a continuation of application No. 16/558,891, filed on Sep. 3, 2019, granted, now 10,965,660.
Application 16/558,891 is a continuation of application No. 16/043,842, filed on Jul. 24, 2018, granted, now 10,659,447, issued on May 19, 2020.
Application 16/043,842 is a continuation of application No. 15/096,644, filed on Apr. 12, 2016, granted, now 10,057,232, issued on Aug. 21, 2018.
Application 15/096,644 is a continuation of application No. 14/770,774, granted, now 9,787,661, issued on Oct. 10, 2017, previously published as PCT/SE2015/050822, filed on Jul. 13, 2015.
Claims priority of provisional application 62/121,689, filed on Feb. 27, 2015.
Prior Publication US 2021/0176227 A1, Jun. 10, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04W 12/10 (2021.01); H04W 12/041 (2021.01); H04W 12/069 (2021.01); H04W 12/0431 (2021.01); G06F 21/60 (2013.01); H04L 9/32 (2006.01)
CPC H04L 63/08 (2013.01) [G06F 21/602 (2013.01); H04L 9/0816 (2013.01); H04L 9/0844 (2013.01); H04L 9/3271 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 63/0853 (2013.01); H04L 63/0869 (2013.01); H04W 12/041 (2021.01); H04W 12/0431 (2021.01); H04W 12/069 (2021.01); H04W 12/10 (2013.01); H04L 63/123 (2013.01); H04L 2463/082 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A first network device of a first communication network, the first network device comprising:
processing circuitry; and
memory coupled with the processing circuitry, wherein the memory includes instructions that when executed by the processing circuitry causes the first network device to perform operations comprising:
obtaining a challenge;
obtaining a first Diffie-Hellman (DH) parameter;
obtaining a first verification code for the first DH parameter;
sending, by the first network device, the challenge, the first DH parameter, and the first verification code to a communication device;
receiving, at the first network device, a second DH parameter, a second verification code, and a response parameter from the communication device;
determining that the response parameter is authentic;
verifying the second DH parameter based on the second verification code;
computing a session key for communication between the communication device and the first network device, the session key being based on the first DH parameter and the second DH parameter; and
transmitting messages towards the communication device using the session key to provide perfect forward security.