Method and apparatus for securely transmitting distributed...

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S319000, C380S028000, C713S170000, C713S187000, C713S152000

Reexamination Certificate

active

06529487

ABSTRACT:

BACKGROUND
I. Field of the Invention
The present invention relates to digital telephone technology in general, and the authentication of mobile stations in cellular telephone systems in particular.
II. Description
The field of wireless communications has many applications including, for example, cordless telephones, paging, wireless local loops, and satellite communications systems. A particularly important application is cellular telephone systems for mobile subscribers. (As used herein, the term “cellular systems” includes both cellular and PCS frequencies.) Various over-the-air interfaces have been developed for such cellular telephone systems including, for example, frequency division multiple access (FDMA), time division multiple access (TDMA), and code division multiple access (CDMA). In connection therewith, various domestic and international standards have been established including, for example, Advanced Mobile Phone Service (AMPS), Global System for Mobile (GSM), and Interim Standard 95 (IS-95). In particular, IS-95 and its derivatives, IS-95A, ANSI J-STD-008, etc. (collectively referred to herein as IS-95), are promulgated by the Telecommunication Industry Association (TIA) and other well known standards bodies.
Cellular telephone systems configured in accordance with the IS-95 standard employ CDMA signal processing techniques. An exemplary cellular telephone system configured substantially in accordance with the IS-95 standard is described in U.S. Pat. No. 5,103,459, which is assigned to the assignee of the present invention and fully incorporated herein by reference. The aforesaid patent illustrates transmit, or forward-ink, signal processing in a CDMA base station. Exemplary receive, or reverse-link, signal processing in a CDMA base station is described in U.S. patent application Ser. No. 08/987,172, filed Dec. 9, 1997, entitled MULTICHANNEL DEMODULATOR, now abandoned, which is assigned to the assignee of the present invention and fully incorporated herein by reference.
In cellular telephone systems generally, mobile subscriber units, or mobile stations, must be authenticated by a base station. Authentication is the process by which information is exchanged between a mobile station and a base station for the purpose of confirming the identity of the mobile station. Cellular communications standards typically define procedures for authentication of mobile stations. Cellular standards published by the TIA provide two methods for authenticating mobile stations, the “unique challenge” method and the “broadcast challenge” method. TIA standards utilizing the foregoing authentication methods include, for example, IS-91 (an AMPS standard), IS-54 (a TDMA standard defining analog control channels), IS-136 (a TDMA standard defining digital control channels) and IS-95.
The unique challenge method is well known to those having skill in the art. In systems utilizing this method the cellular infrastructure (base station and/or base station controller) sends a challenge value to a mobile station, and the mobile station sends a response that is computed from the challenge, the mobile station identifier and secret data known only to the base station and the mobile station (assuming the mobile station is a legitimate mobile station). If the response is correct, the cellular infrastructure provides access to services such as telephone connections. The unique challenge method however has the disadvantage that the time required to complete the challenge-response process can be relatively long and unduly delay call setup. For this reason, the broadcast challenge method has been included in TIA cellular standards as a means of providing rapid authentication of requests for access to cellular services.
Under the broadcast challenge method of authentication, a challenge value (referred to in general as “RAND”) is broadcast on a cellular control channel to mobile stations. The mobile stations store this challenge value when they receive them and subsequently use it, together with other stored information, when they request access to cellular services from the base station.
Authentication procedures are used by cellular telephone systems in a number of situations. For instance, base stations often require authentication of mobile station registrations, originations and terminations. Registration is the process by which a mobile station identifies its location and sends certain parameters to a base station. Origination procedures are instituted when a user directs the mobile station to initiate a call. Termination procedures are instituted when another party places a call to a mobile station, and the mobile station responds to a page message in order to accept the call.
In IS-95 configured CDMA systems, a mobile station will be authenticated only when the base station determines that both it and the mobile station possess identical sets of Shared Secret Data (SSD) and an identical Random Challenge Value (RCV). SSD is a 128-bit quantity that is known to both the base station and a mobile station, and is stored by the mobile station in its semi-permanent memory. The first 64 bits of SSD comprise the numerical value SSD A and the remaining 64 bits comprise the numerical value SSD B. SSD A is used in the authentication process, while SSD B is used in the voice privacy and message encryption processes. The RCV is a 32-bit number that corresponds to the challenge value used in the broadcast challenge method of authentication referred to above and will be discussed in more detail below. The 8 most significant bits of the RCV are sometimes referred to as RANDC, while the 24 least significant bits of the RCV are sometimes referred to as RANDL.
In the context of a mobile station origination in an IS-95 configured CDMA cellular telephone system, a typical mobile station authentication would be as follows. A user directs the mobile station to institute a telephone call. The mobile station determines whether the stored value of the authentication information element (AUTH) is set to “01,” indicating that standard authentication mode should be used. If set to “01,” the mobile station calculates the value of the Authentication Signature information element (AUTH SIGNATURE) in accordance with certain authentication algorithms described in “Common Cryptographic Algorithms,” a publication available through the Telecommunications Industry Association but subject to restricted distribution. The AUTH_SIGNATURE input parameters and the values supplied by the mobile station for origination authentication would be as follows:
RAND_CHALLENGE
ESN
AUTH_DATA
SSD_AUTH
SAVE_REGISTERS
RAND
s
ESN
p
DIGITS
SSD_A
TRUE
where RAND
s
=Stored Random Challenge Memory, the stored value of the 32-bit Random Challenge Memory (RAND); ESN
p
=Electronic Serial Number, a 32-bit value that uniquely identifies the mobile station stored in the permanent memory of the mobile station; and DIGITS=the encoded last six digits of the CHARi field in the mobile station Origination Message.
Once the mobile station calculates AUTH_SIGNATURE, the AUTHR field of the mobile station Origination Message is set to the value of AUTH_SIGNATURE, the RANDC field is set to the eight most significant bits of RAND
s
and the Origination Message is transmitted to the base station. The base station then computes the value of AUTHR in the same manner as the mobile station, using its internally stored value of SSD_A, compares this computed value with the value of AUTHR received from the mobile station, and compares the received value of RANDC to the eight most significant bits of its internally stored value of RAND. If the comparisons executed at the base station are successful, the base station will initiate the procedures used to assign the mobile station to various Traffic Channels. If either of the comparisons fail, the base station may deny service, initiate the Unique Challenge-Response Procedure or commence the SSD Update Procedure.
In typical cellular telephone systems the available frequency spectrum is divided into a number of channel

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securely transmitting distributed... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securely transmitting distributed..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely transmitting distributed... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3010926

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.