Method and system for delegation of security procedures to a...

Cryptography – Cellular telephone cryptographic authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S270000, C380S044000, C713S168000

Reexamination Certificate

active

06879690

ABSTRACT:
A method and system for delegation of security procedures to a second domain. A first key is generated for a mobile node. The first key is stored at the mobile node and at a home domain of the mobile node. The mobile node is moved to the second domain. A request is sent from the second domain to the home domain to authenticate the mobile node. A second key is generated at the home domain using the first key and a random number. The random number and the second key are sent to the second domain. The random number is sent to the mobile node by the second domain. The mobile node generates the second key using the random number and the first key. The second key is used for authentication procedures and/or key derivation procedures between the mobile node and the second domain.

REFERENCES:
patent: 5091942 (1992-02-01), Dent
patent: 5668875 (1997-09-01), Brown et al.
patent: 6522880 (2003-02-01), Verma et al.
Bruce Schneier, Applied Cryptography,second edition,,John Wiley and Sons,Inc.,pp. 33-34, 180, Oct. 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for delegation of security procedures to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for delegation of security procedures to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for delegation of security procedures to a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3414970

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.