-
公开(公告)号:JP2000115161A
公开(公告)日:2000-04-21
申请号:JP23907699
申请日:1999-08-26
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
Abstract: PROBLEM TO BE SOLVED: To protect the anonymity of a radio mobile object. SOLUTION: A network transmits a temporary mobile object identifier (TID) updating request to the mobile object together with a challenge. By public key ciphering, the permanent ID is ciphered and transmitted to the network. Also, the mobile object 20 generates a second challenge and a first challenge response. The first challenge response is generated by executing a key type cipher function(KCF). The second challenge and the first challenge response are transmitted to the network provided with the ciphered permanent ID. After deciphering the permanent ID, the network accesses a key relating to the mobile object and then, the mobile object 20 is authenticated by using the key. When it is authenticated, the TID of the mobile object 20 is calculated. The network further generates a second challenge response and transmits it to the mobile object. The mobile object 20 calculates the TID in the case of authenticating the network.
-
公开(公告)号:JP2000083017A
公开(公告)日:2000-03-21
申请号:JP21454299
申请日:1999-07-29
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
Abstract: PROBLEM TO BE SOLVED: To update secret shared data by allowing an authentication center/ home position register to respond to a session request to be transmitted and a 1st global random number and allowing a mobile device to transmit and use a keyed encryption function calculated by generating a 2nd random number and a count value. SOLUTION: An authentication center/home position register AC/HLR: 10 generates a global random number RN and transmits it together with a session request(SR) to a mobile device 20. The mobile device 20 generates a random number RM and counter value (CT) in response to this transmission and calculates and outputs a keyed encryption function (KCF)MKEY(TYPE, 0, RM, RN and CT). The device 20 increases the CT to the SR of each secret shared data(SSD) updation and then transmits its KCFMKEY. Because an attacker uses an old CT, a network does not authenticate it so that the attacker can not generate the SSD by such a manner that the AC/HLR: 10 verifies the mobile device 20 by using the KCF.
-
公开(公告)号:JPH11252668A
公开(公告)日:1999-09-17
申请号:JP36891798
申请日:1998-12-25
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
Abstract: PROBLEM TO BE SOLVED: To reinforce an authentication protocol by using the most significant digit of a dialed telephone number as a parameter at the time of calculating an authentication code. SOLUTION: A radio communication network 60 produces a random number (RANDOM) and sends it to a handset 62. The handset 62 uses it in response to a challenge and calculates (determines) an authentication code (AUTH). When the handset 62 receives the challenge, it calculates the AUTH by using a 1st set of information related to the RANDOM and the handset 62 as its enciphering function, e.g. a parameter to a CAVE algorithm. And the handset 62 returns a 2nd set of information related to the AUTH and the handset 62 to a network 60 as its own response to a challenge of the network. Furthermore, the most significant digit of a dialed telephone number is used as a parameter to calculate the AUTH.
-
公开(公告)号:AU2008311306A1
公开(公告)日:2009-04-16
申请号:AU2008311306
申请日:2008-10-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
IPC: H04W12/04
Abstract: In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.
-
公开(公告)号:DE602005001637D1
公开(公告)日:2007-08-30
申请号:DE602005001637
申请日:2005-02-15
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR , WONG MARCUS
Abstract: In the method, a value of a first cryptosync for a communication session is derived based on a value of a second cryptosync. The second cryptosync has a longer life than the first cryptosync.
-
公开(公告)号:CA2276874C
公开(公告)日:2003-02-25
申请号:CA2276874
申请日:1999-07-02
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
Abstract: In the method for establishing a session key, a network and a mobile transfer codes between one another. The mobile and the network perform mutual authentication based on the codes. Besides performing this mutual authentication, the mobile and the network to establish the session key based on the codes. In one embodiment, the messages forming part of the intended session are sent with the codes, and form a basis upon which the codes for authentication have been derived.
-
公开(公告)号:DE69904525D1
公开(公告)日:2003-01-30
申请号:DE69904525
申请日:1999-02-23
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR , SUNDARAM GANAPATHY SUBRAMANIAN
Abstract: The present invention is a method for outputting larger bit size pseudo-random number zi that is cryptographically secure. Since larger bit size pseudo-random numbers are being outputted, larger bit size segments of messages may be encrypted resulting in a speedier encryption process than encryption processes of the prior art. In one embodiment, the present invention is a pseudo-random number generator defined by a modular exponential function xi = g <>i-1 mod p. The output of the pseudo-random number generator being a pseudo-random number zi comprising a j-1 bit size segment of xi. The value of j being less than or equal to m-2c (i.e., j≤m-2c). In an embodiment of the present invention, the pseudo-random number zi includes the j least significant bits of xi excluding the least significant bit of xi.
-
公开(公告)号:BR9904711A
公开(公告)日:2000-10-03
申请号:BR9904711
申请日:1999-10-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR , SUNDARAM GANAPATHY SUBRAMANIAN , RAMZAN ZULFIKAR AMIN
-
公开(公告)号:BR9904714A
公开(公告)日:2000-09-12
申请号:BR9904714
申请日:1999-10-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR , ZULFIKAR AMIN RAMZAN
Abstract: An efficient hashing technique uses w + w/2 operations to hash a string "w" words long rather than the w operations of the prior art. This efficiency is achieved by squaring the sum of the key and the string to be hashed rather than forming a product of the key and the string to be hashed.
-
公开(公告)号:BR9902941A
公开(公告)日:2000-08-15
申请号:BR9902941
申请日:1999-07-23
Applicant: LUCENT TECHNOLOGIES INC
Inventor: PATEL SARVAR
Abstract: In the method for securing over-the-air communication in wireless system, a mobile sends a system access request and dummy data associated with the system access request to a network. The network sends a first data stream including a first data portion to the mobile in response to the system access request and the dummy data. The mobile extracts the first data portion from the first bit stream, and sends a second bit stream to the network. The second bit stream includes a second data portion. The mobile and the network both generate a key based on the first data portion and the second data portion, and establish a first encrypted and authenticated communication channel in cooperation using the key. The mobile then transfers authorizing information to the network over the first encrypted and authenticated communication channel. If accepted, a second encrypted and authenticated communication channel is established. The network then sends sensitive information such as the root or A-key to the mobile over the second encrypted and authenticated communication channel.
-
-
-
-
-
-
-
-
-