Cryptography – Cellular telephone cryptographic authentication
Reexamination Certificate
2006-10-17
2006-10-17
Sheikh, Ayaz (Department: 2131)
Cryptography
Cellular telephone cryptographic authentication
C380S258000, C380S259000, C380S266000, C380S270000, C380S271000, C380S272000, C380S273000, C713S161000, C713S168000, C713S169000, C713S170000, C713S171000, C455S436000, C455S437000, C455S438000, C455S439000
Reexamination Certificate
active
07123719
ABSTRACT:
A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).
REFERENCES:
patent: 4841433 (1989-06-01), Hakim
patent: 4888800 (1989-12-01), Marshall
patent: 5164988 (1992-11-01), Matyas et al.
patent: 5199072 (1993-03-01), White
patent: 5329573 (1994-07-01), Chang
patent: 5588062 (1996-12-01), Altschuler et al.
patent: 5794139 (1998-08-01), Mizikovsky
patent: 5812955 (1998-09-01), Dent et al.
patent: 5850444 (1998-12-01), Rune
patent: 5889861 (1999-03-01), Ohashi
patent: 6026298 (2000-02-01), Lamb et al.
patent: 6128389 (2000-10-01), Chan et al.
patent: 6134431 (2000-10-01), Matsumoto et al.
patent: 6477387 (2002-11-01), Jackson
patent: 6707915 (2004-03-01), Jobst et al.
patent: 1011222 (1999-06-01), None
patent: 1011222 (1999-06-01), None
patent: WO 00/48363 (2000-08-01), None
Terrestrial Trunked Radio (TETRA) Voice Plus Data (V+D) Part 7: Security (EN 300 392-7 V2.0.19 (Nov. 2000) —IDS.
“TETRA Security” (Gert Roelofsen, Information Security Technical Report, vol. 5, No. 3, 2000).
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security EN 300 392-7.
Menezes A J, et al.: “Handbook of Applied Cryptography, PASSAGE”, Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, Boca Raton, FL, CRC Press, US pp. 387, 389, 394-395, 497-499, 551-553, 578, 580 XP002274300 ISBN: O-8493-8523-7.
Menezes A J, et al.: “Handbook of Applied Cryptography, Key Management Techniques”, Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and its Applications, Boca Raton, FL, CRC Press, US pp. 570-572 XP002249713 ISBN: 0-8493-8523-7.
Roelofsen, Security Issues for TETRA Networks, TETRA Conference, PTT Telecom/KPN Research 1998.
Anderson Walter F.
Chater-Lea David J
Johur Jason
Kremske Randy
McDonald Daniel J.
Chai Longbit
Davis Valerie M.
Motorola Inc.
Santema Steven R.
Sheikh Ayaz
LandOfFree
Method and apparatus for providing authentication in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for providing authentication in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for providing authentication in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3679111