Cryptography – Cellular telephone cryptographic authentication
Reexamination Certificate
2000-05-17
2009-06-02
Revak, Christopher A (Department: 2431)
Cryptography
Cellular telephone cryptographic authentication
C380S255000, C380S270000, C380S272000, C713S150000, C713S161000, C713S168000, C713S170000, C713S176000, C713S180000, C713S182000, C726S004000, C455S410000
Reexamination Certificate
active
07542569
ABSTRACT:
The invention concerns the security of the data connections of a telephone user. The basic idea of the invention is to forward the authentication of a telephone system to the leg between two private data networks connected via an arbitrating network. When establishing the connection, the private network connected to the telephone system forwards the authenticated subscriber identity to the other private network. To provide the identity forwarded with authenticity, the message containing the identity is signed. To provide encryption of the subscriber identity, the message is encrypted using a public key method. In response the second private network generates a session key to be used in the connection. This key is signed and encrypted using a public key method and sent to the first private network. During the connection, a symmetrical encryption method with the session key is used.
REFERENCES:
patent: 4262329 (1981-04-01), Bright et al.
patent: 5204902 (1993-04-01), Reeds, III et al.
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5341499 (1994-08-01), Doragh
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5377267 (1994-12-01), Suzuki et al.
patent: 5386468 (1995-01-01), Akiyama et al.
patent: 5457737 (1995-10-01), Wen
patent: 5546463 (1996-08-01), Caputo et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5706347 (1998-01-01), Burke et al.
patent: 5809144 (1998-09-01), Sirbu et al.
patent: 5850444 (1998-12-01), Rune
patent: 6061796 (2000-05-01), Chen et al.
patent: 6134432 (2000-10-01), Holmes et al.
patent: 6285991 (2001-09-01), Powar
patent: 6408175 (2002-06-01), Park
patent: 6532290 (2003-03-01), Dent
patent: 6829356 (2004-12-01), Ford
patent: 7480801 (2009-01-01), Euchner et al.
patent: 7480939 (2009-01-01), Nessett et al.
patent: 2008/0109448 (2008-05-01), Aboel-Nil et al.
patent: 2008/0294891 (2008-11-01), Ram OV et al.
patent: 0 481 121 (1992-04-01), None
patent: 0 739 105 (1996-10-01), None
patent: 1331614 (2003-07-01), None
patent: 2 279 540 (1995-01-01), None
patent: 2 287 160 (1995-09-01), None
patent: 95/23473 (1995-08-01), None
patent: 96/05675 (1996-02-01), None
patent: 97/24831 (1997-07-01), None
patent: WO 9927678 (1999-06-01), None
Newton, Harry, Newton's Telecom Dictionary, 1998, 14th updated and expanded edition, pp. 213, 720, 748.
Schneier, Bruce, Applied Cryptography, 1996, John Wiley & Sons, Inc., Second Edition, pp. 31, 37, 53, 54.
Harn et al, On the Security of Wireless Network Access with Enhancements, 2003, ACM, pp. 88-95.
Bhargavan et al, Verifying Policy-Based Web Services Security, 2008, ACM, pp. 1-59.
Lee et al, Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography, 2003, IEEE, pp. 597-603.
Elkamshoushy et al, New Proxy Signcryption Scheme with DSA Verifier, 2006, IEEE, pp. 1-8.
Moorthy Aravind K
Nokia Siemens Networks OY
Revak Christopher A
Squire Sanders & Dempsey LLP
LandOfFree
Security of data connections does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security of data connections, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security of data connections will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4128510