SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
key management
    service
        A labs.ericsson.com API
 https://labs.ericsson.com/apis/key-management-service/
Key management service
› Secure P2P service

› This service allows two clients to establish a shared
  secret key via an easy-to-use API
› The key can be used to secure all types of peer-to-peer
  communication e.g. voice calls, conferencing, video, chat,
  immediate messaging, file transfer, etc.
› Since MWSB (GBA) is used for bootstrapping, nothing
  new needs to be managed or distributed




© Ericsson AB 2010 | Page 2
WHY key management service?
› Existing security enablers (MWSB and Oauth2) are client-
  server – not peer-to-peer
› Currently key management for P2P is complicated and
  therefore not used
› The Secure P2P enabler gives app developers an easy-to-
  use API
› Extensibility – can be used to secure any type of P2P
  communication
› Standard – recently standardized in 3GPP and IETF




© Ericsson AB 2010 | Page 3
Overview




© Ericsson AB 2010 | Page 4
C API Usage
› An easy-to-use C library is available on the Ericsson Labs
  portal
› The library handles message creation/parsing and the
  communication with the KMS
› As a developer, all you need to do is:
      – Setup the Initiator and Responder
      – Deliver the Initiator’s initmsg (output by the library) to the Responder
      – Deliver the Responder’s respmsg (also output by the library) to the
        Initiator
› Once the above is done, the shared key can be retrieved
  by calling the function getKey()


© Ericsson AB 2010 | Page 5
C API usage – Initiator
client_t  *initiator;
char      *initmsg, *respmsg;
unsigned char key[KEY_LEN];

// Setup the Initiator KMS client
initiator = client_init(IMPI_I, IMPU_I, KEY_I, APIKEY, HTTP-PROXY);

initmsg = create_transfer_init(initiator);

< application specific: initmsg is sent and respmsg is received >

parse_transfer_resp(initiator, respmsg);

get_key(initiator, key);

< Use key to secure Initiator-Responder communication >
        Note: The Initiator IMPI, IMPU, and key are obtained via the MWSB API at Ericsson Labs

© Ericsson AB 2010 | Page 6
C API usage – Responder
client_t  *responder;
char      *respmsg, *initmsg;
unsigned char key[KEY_LEN];

// Setup the Responder KMS client
responder = client_init(IMPI_R, IMPU_R, KEY_R, APIKEY, HTTP-PROXY);

< application specific: initmsg is received from Initiator >

respmsg = parse_transfer_init(responder, initmsg)

< application specific: respmsg is sent to Initiator >

get_key(responder, key);

< Use key to secure Initiator-Responder communication >

        Note: The Responder IMPI, IMPU, and key are obtained via the MWSB API at Ericsson Labs

© Ericsson AB 2010 | Page 7
Example applications

                               Secure messaging



          Secure video                                     Secure voice




             Secure chat
                                                         Secure conferencing


                               Secure file transfer


        Any application requiring confidentiality, authentication, or integrity

© Ericsson AB 2010 | Page 8
© Ericsson AB 2010 | Page 9

Weitere ähnliche Inhalte

Mehr von Ericsson Labs

5G for the Networked Society beyond 2020
5G for the Networked Society beyond 20205G for the Networked Society beyond 2020
5G for the Networked Society beyond 2020
Ericsson Labs
 
3D visual communication
3D visual communication3D visual communication
3D visual communication
Ericsson Labs
 
Openflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson CollaborationOpenflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson Collaboration
Ericsson Labs
 
Federated Networked Cloud
Federated Networked CloudFederated Networked Cloud
Federated Networked Cloud
Ericsson Labs
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
Ericsson Labs
 
The Connected Megacity
The Connected MegacityThe Connected Megacity
The Connected Megacity
Ericsson Labs
 
The Networked Society
The Networked SocietyThe Networked Society
The Networked Society
Ericsson Labs
 
Stream analytics for churn prediction from Ericsson Research
Stream analytics for churn prediction from Ericsson ResearchStream analytics for churn prediction from Ericsson Research
Stream analytics for churn prediction from Ericsson Research
Ericsson Labs
 
Web Device Connectivity on Ericsson Labs
Web Device Connectivity on Ericsson LabsWeb Device Connectivity on Ericsson Labs
Web Device Connectivity on Ericsson Labs
Ericsson Labs
 

Mehr von Ericsson Labs (20)

Ericsson Application Awards 2014
Ericsson Application Awards 2014Ericsson Application Awards 2014
Ericsson Application Awards 2014
 
5G for the Networked Society beyond 2020
5G for the Networked Society beyond 20205G for the Networked Society beyond 2020
5G for the Networked Society beyond 2020
 
3D visual communication
3D visual communication3D visual communication
3D visual communication
 
Openflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson CollaborationOpenflow Stanford University - Ericsson Collaboration
Openflow Stanford University - Ericsson Collaboration
 
Federated Networked Cloud
Federated Networked CloudFederated Networked Cloud
Federated Networked Cloud
 
Exploring Big Data
Exploring Big DataExploring Big Data
Exploring Big Data
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
 
The Connected Megacity
The Connected MegacityThe Connected Megacity
The Connected Megacity
 
The Networked Society
The Networked SocietyThe Networked Society
The Networked Society
 
Towards Timely Efficient Semantic Reasoning for the Networked Society
Towards Timely Efficient Semantic Reasoning for the Networked SocietyTowards Timely Efficient Semantic Reasoning for the Networked Society
Towards Timely Efficient Semantic Reasoning for the Networked Society
 
Web Connectivity on Ericsson Labs
Web Connectivity on Ericsson LabsWeb Connectivity on Ericsson Labs
Web Connectivity on Ericsson Labs
 
Stream analytics for churn prediction from Ericsson Research
Stream analytics for churn prediction from Ericsson ResearchStream analytics for churn prediction from Ericsson Research
Stream analytics for churn prediction from Ericsson Research
 
Geo Location Messaging on Ericsson Labs
Geo Location Messaging on Ericsson LabsGeo Location Messaging on Ericsson Labs
Geo Location Messaging on Ericsson Labs
 
An Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsAn Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIs
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
Mobile Monday Athens 111003
Mobile Monday Athens 111003Mobile Monday Athens 111003
Mobile Monday Athens 111003
 
Mobile Monday London M2M Event 110516
Mobile Monday London M2M Event 110516Mobile Monday London M2M Event 110516
Mobile Monday London M2M Event 110516
 
Distributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson LabsDistributed Shared Memory on Ericsson Labs
Distributed Shared Memory on Ericsson Labs
 
OAuth2 on Ericsson Labs
OAuth2 on Ericsson LabsOAuth2 on Ericsson Labs
OAuth2 on Ericsson Labs
 
Web Device Connectivity on Ericsson Labs
Web Device Connectivity on Ericsson LabsWeb Device Connectivity on Ericsson Labs
Web Device Connectivity on Ericsson Labs
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Kürzlich hochgeladen (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 

Key Management Service on Ericsson Labs

  • 1. key management service A labs.ericsson.com API https://labs.ericsson.com/apis/key-management-service/
  • 2. Key management service › Secure P2P service › This service allows two clients to establish a shared secret key via an easy-to-use API › The key can be used to secure all types of peer-to-peer communication e.g. voice calls, conferencing, video, chat, immediate messaging, file transfer, etc. › Since MWSB (GBA) is used for bootstrapping, nothing new needs to be managed or distributed © Ericsson AB 2010 | Page 2
  • 3. WHY key management service? › Existing security enablers (MWSB and Oauth2) are client- server – not peer-to-peer › Currently key management for P2P is complicated and therefore not used › The Secure P2P enabler gives app developers an easy-to- use API › Extensibility – can be used to secure any type of P2P communication › Standard – recently standardized in 3GPP and IETF © Ericsson AB 2010 | Page 3
  • 4. Overview © Ericsson AB 2010 | Page 4
  • 5. C API Usage › An easy-to-use C library is available on the Ericsson Labs portal › The library handles message creation/parsing and the communication with the KMS › As a developer, all you need to do is: – Setup the Initiator and Responder – Deliver the Initiator’s initmsg (output by the library) to the Responder – Deliver the Responder’s respmsg (also output by the library) to the Initiator › Once the above is done, the shared key can be retrieved by calling the function getKey() © Ericsson AB 2010 | Page 5
  • 6. C API usage – Initiator client_t *initiator; char *initmsg, *respmsg; unsigned char key[KEY_LEN]; // Setup the Initiator KMS client initiator = client_init(IMPI_I, IMPU_I, KEY_I, APIKEY, HTTP-PROXY); initmsg = create_transfer_init(initiator); < application specific: initmsg is sent and respmsg is received > parse_transfer_resp(initiator, respmsg); get_key(initiator, key); < Use key to secure Initiator-Responder communication > Note: The Initiator IMPI, IMPU, and key are obtained via the MWSB API at Ericsson Labs © Ericsson AB 2010 | Page 6
  • 7. C API usage – Responder client_t *responder; char *respmsg, *initmsg; unsigned char key[KEY_LEN]; // Setup the Responder KMS client responder = client_init(IMPI_R, IMPU_R, KEY_R, APIKEY, HTTP-PROXY); < application specific: initmsg is received from Initiator > respmsg = parse_transfer_init(responder, initmsg) < application specific: respmsg is sent to Initiator > get_key(responder, key); < Use key to secure Initiator-Responder communication > Note: The Responder IMPI, IMPU, and key are obtained via the MWSB API at Ericsson Labs © Ericsson AB 2010 | Page 7
  • 8. Example applications Secure messaging Secure video Secure voice Secure chat Secure conferencing Secure file transfer Any application requiring confidentiality, authentication, or integrity © Ericsson AB 2010 | Page 8
  • 9. © Ericsson AB 2010 | Page 9