-
公开(公告)号:JP2002084276A
公开(公告)日:2002-03-22
申请号:JP2001177861
申请日:2001-06-13
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: PROBLEM TO BE SOLVED: To provide an improved method for authentication of a user subscription identity module(USIM). SOLUTION: This invention relates to the improved method that prevents a rogue mobile to fraudulently gain access a communication system with respect to an AKA(authentication key agreement) procedure having already been decided. The communication system of this invention periodically transmits a challenge interrogation message to request certification of legality of the mobile permitted for the use of the system at present. The mobile unit calculates authentication response on the basis of the information recognized by only the communication system and the USIM of the mobile and transmits the authentication response to the communication system. The communication system also individually calculates the authentication response and compares the response with the response received from the mobile. When the two authentication responses are equal to each other, the mobile is authenticated by the system. When not equal to each other, no access to the communication system is given to the mobile unit.
-
公开(公告)号:DE60200136T2
公开(公告)日:2004-09-16
申请号:DE60200136
申请日:2002-04-10
Applicant: LUCENT TECHNOLOGIES INC
Inventor: JACOBSON TERRY , ROLLENDER DOUGLAS HAROLD , MARCOVICI MICHAEL
Abstract: Disclosed is a method and apparatus for providing authentication for a subscriber of a wireless communication system employing one type of authentication technology roaming into a wireless communication system employing a second type of authentication technology. The method and apparatus involves transmitting (or receiving) a first message to a first system comprising a mobile identifier for a subscriber of the first and a second system indicator indicating that the subscriber is attempting to gain access to a second system that uses an authentication process different than an authentication process used by the first system; determining shared secret data for the subscriber using the mobile identifier; receiving (or transmitting) a second message from the first system having shared secret data associated with the subscriber; generating an expected response to a unique challenge using the shared secret data and an encryption algorithm, and transmitting the expected response to the second system.
-
公开(公告)号:DE602004004844T2
公开(公告)日:2007-10-25
申请号:DE602004004844
申请日:2004-08-27
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B , PATEL SARVAR M , BLUMENTHAL URI
Abstract: A method is provided for determining a private key for a first network based on at least one security value associated with a second network. The method further includes establishing a plurality of sessions between a mobile terminal and the first network based on the private key.
-
公开(公告)号:DE602004004844D1
公开(公告)日:2007-04-05
申请号:DE602004004844
申请日:2004-08-27
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B , PATEL SARVAR M , BLUMENTHAL URI
Abstract: A method is provided for determining a private key for a first network based on at least one security value associated with a second network. The method further includes establishing a plurality of sessions between a mobile terminal and the first network based on the private key.
-
公开(公告)号:CA2344757A1
公开(公告)日:2001-12-13
申请号:CA2344757
申请日:2001-04-18
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by th e communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
-
公开(公告)号:DE60002700T2
公开(公告)日:2004-04-08
申请号:DE60002700
申请日:2000-12-19
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
-
公开(公告)号:DE60002700D1
公开(公告)日:2003-06-18
申请号:DE60002700
申请日:2000-12-19
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
-
公开(公告)号:AU5177701A
公开(公告)日:2001-12-20
申请号:AU5177701
申请日:2001-06-06
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
-
公开(公告)号:CA2344757C
公开(公告)日:2006-05-30
申请号:CA2344757
申请日:2001-04-18
Applicant: LUCENT TECHNOLOGIES INC
Inventor: MARCOVICI MICHAEL , MIZIKOVSKY SEMYON B
Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits sa id response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
-
公开(公告)号:ES2213733T3
公开(公告)日:2004-09-01
申请号:ES02252544
申请日:2002-04-10
Applicant: LUCENT TECHNOLOGIES INC
Inventor: JACOBSON TERRY , ROLLENDER DOUGLAS HAROLD , MARCOVICI MICHAEL
Abstract: Disclosed is a method and apparatus for providing authentication for a subscriber of a wireless communication system employing one type of authentication technology roaming into a wireless communication system employing a second type of authentication technology. The method and apparatus involves transmitting (or receiving) a first message to a first system comprising a mobile identifier for a subscriber of the first and a second system indicator indicating that the subscriber is attempting to gain access to a second system that uses an authentication process different than an authentication process used by the first system; determining shared secret data for the subscriber using the mobile identifier; receiving (or transmitting) a second message from the first system having shared secret data associated with the subscriber; generating an expected response to a unique challenge using the shared secret data and an encryption algorithm, and transmitting the expected response to the second system.
-
-
-
-
-
-
-
-
-