Authentication in a telecommunications network

Data processing: financial – business practice – management – or co – Business processing using cryptography – Secure transaction

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S064000, C705S050000, C705S051000

Reexamination Certificate

active

07660772

ABSTRACT:
The invention relates to an authentication method intended for a telecommunications network, especially for an IP network. From a terminal (TE1) in the network a first message (RR) containing an authenticator and a data unit is transmitted to the network, the data unit containing information relating to the manner in which the authenticator is formed. For carrying out authentication in the network, the data unit contained in the first message is used for determining a check value, which is compared with the said authenticator. To make it unnecessary for the terminal to perform any complicated and heavy exchange of messages when attaching to the network and for still obtaining the desired security characteristics for use, such an identification unit is used in the terminal which receives as input a challenge from which a response and a key can be determined essentially in the same manner as in the subscriber identity module of a known mobile communications system, a set of authentication blocks is generated into the network, of which each contains a challenge, a response, and a key, whereby the generation is performed in the same manner as in the said mobile communication system, at least some of the challenges contained by the authentication blocks are transmitted to the terminal, one of the challenges is chosen for use at the terminal, and, based on it, a response and key for use are determined with the aid of the terminal's identification unit, in the said first message (RR) the network is notified with the aid of the said data unit of which key corresponding to which challenge was chosen, and the authenticator of the first message and the said check value are determined with the aid of the chosen key.

REFERENCES:
patent: 5311596 (1994-05-01), Scott et al.
patent: 5442342 (1995-08-01), Kung
patent: 5668875 (1997-09-01), Brown et al.
patent: 5689563 (1997-11-01), Brown et al.
patent: 5729537 (1998-03-01), Billstrom
patent: 5864757 (1999-01-01), Parker
patent: 5991407 (1999-11-01), Murto
patent: 6076163 (2000-06-01), Hoffstein et al.
patent: 6167279 (2000-12-01), Chang et al.
patent: 6219793 (2001-04-01), Li et al.
patent: 6377691 (2002-04-01), Swift et al.
patent: 6427073 (2002-07-01), Kortesalmi et al.
patent: 6772336 (2004-08-01), Dixon, Jr.
patent: 6802600 (2004-10-01), Park
patent: 6909708 (2005-06-01), Krishnaswamy et al.
patent: 7145898 (2006-12-01), Elliott
patent: 2002/0069174 (2002-06-01), Fox et al.
patent: 2004/0093493 (2004-05-01), Bisbee et al.
patent: 0912017 (1999-04-01), None
patent: 2004242142 (2004-08-01), None
patent: WO 97/45814 (1997-12-01), None
patent: WO 98/32301 (1998-07-01), None
patent: WO 98/44402 (1998-10-01), None
Upkar Varshney,Supporting Mobility with Wireless ATM, Internet Watch, Jan. 1997.
C. Perkins, editor, Network Working Group,rfc2002.txt, Oct. 1996.
International Search Report for PCT/FI99/00593.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication in a telecommunications network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication in a telecommunications network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication in a telecommunications network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4232760

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.