Authentication in a packet data network

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C455S411000

Reexamination Certificate

active

07107620

ABSTRACT:
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.

REFERENCES:
patent: 1918 (1840-12-01), Hoffpauir et al.
patent: 5159592 (1992-10-01), Perkins
patent: 5519706 (1996-05-01), Bantz et al.
patent: 5537474 (1996-07-01), Brown et al.
patent: 5729537 (1998-03-01), Billstrom
patent: 5864757 (1999-01-01), Parker
patent: 6141544 (2000-10-01), Corriveau et al.
patent: 6445922 (2002-09-01), Hiller et al.
patent: 6463055 (2002-10-01), Lupien et al.
patent: 6463154 (2002-10-01), Patel
patent: 6539237 (2003-03-01), Sayers et al.
patent: 6591364 (2003-07-01), Patel
patent: 6600734 (2003-07-01), Gernert et al.
patent: 6654359 (2003-11-01), La Porta et al.
patent: 6671377 (2003-12-01), Havinis et al.
patent: 1075123 (2001-02-01), None
patent: WO 98/32301 (1998-07-01), None
patent: WO 00/02406 (2000-01-01), None
patent: WO 00/02407 (2000-01-01), None
patent: WO 01/41470 (2001-07-01), None
Aravamudhan, Lachu et al. “NAI Resolution for Wireless Networks”, Oct. 1999.
Bird, Ray et al. “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, Feb. 1995, IEEE.
Federrath, Hannes. “Protection in Mobile Communications”, 1999.
Lee, Chii-Hwa et al. “Enhanced privacy and authentication for the global system for mobile communications”, 1999.
Lee, C.-C. et al. “Extension of authentication protocol for GSM”, Apr. 2003.
Lin, Yi-Bing. “GSM Network Signaling (Tutorial Paper)”, 1997.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press, §10.3.
Perkins, Charles E. “Mobile IP Joins Forces with AAA”, Aug. 2000.
Racal Resarch. “GSM System Security Study”, Apr. 1998, <http://jya.com/gsm061088.htm>.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, pp. 52-53.
“PPP Extensible Authentication Protocol”, Blunk et al., pp. 1-15, 1998.
“A Hybrid Authentication Mode for IKE”, Litvin et al., pp. 1-8, 1999.
“Standards for Local and Metropolitan Area Networks: Standard for Port based Network Access Control”, IEEE Draft P802.1X/D9, pp. 1-144, 2000.
“Mobile IP Challenge/Response Extensions”, Perkins et al., pp. 15, 2000.
“Mobile IP Network Access Identifier Extension for IPv4”, Calhoun et al., pp. 8, 2000.
“PKCS #1: RSA Encryption”, Kaliski, pp. 1-19, 1998.
“Internet Security Association and Key Management Protocol”, Maughan et al., pp. 1-86, 1998.
“Internet X.509 Public Key Infrastructure”, Housley et al., pp. 1-129, 1999.
“IP Mobility Support”, pp. 1-65, Perkins, 1996.
“Radius Accounting”, Rigney, pp. 1-21, 1997.
“The Internet Key Exhange”, Harkins et al., pp. 1-41, 1998.
“Remote Authentication Dial In User Service”, Rigney, pp. 1-65, 1997.
“The MD5 Message-Digest Algorithm”, Rivest, pp. 1-21, 1992.
“HMAC: Keyed-Hashing for Message Authentication”, Krawczyk et al., pp. 1-11, 1997.
“The Network Access Identifier”, Aboba et al., pp. 1-8, 1999.
“The MD5 Message—Digest Algorithm”, Rivest, pp. 1-20, 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication in a packet data network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication in a packet data network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication in a packet data network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3550548

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.