IMPROVED METHOD FOR AUTHENTICATION OF USER SUBSCRIPTION IDENTITY MODULE

    公开(公告)号:JP2002084276A

    公开(公告)日:2002-03-22

    申请号:JP2001177861

    申请日:2001-06-13

    Abstract: PROBLEM TO BE SOLVED: To provide an improved method for authentication of a user subscription identity module(USIM). SOLUTION: This invention relates to the improved method that prevents a rogue mobile to fraudulently gain access a communication system with respect to an AKA(authentication key agreement) procedure having already been decided. The communication system of this invention periodically transmits a challenge interrogation message to request certification of legality of the mobile permitted for the use of the system at present. The mobile unit calculates authentication response on the basis of the information recognized by only the communication system and the USIM of the mobile and transmits the authentication response to the communication system. The communication system also individually calculates the authentication response and compares the response with the response received from the mobile. When the two authentication responses are equal to each other, the mobile is authenticated by the system. When not equal to each other, no access to the communication system is given to the mobile unit.

    2.
    发明专利
    未知

    公开(公告)号:DE60200136T2

    公开(公告)日:2004-09-16

    申请号:DE60200136

    申请日:2002-04-10

    Abstract: Disclosed is a method and apparatus for providing authentication for a subscriber of a wireless communication system employing one type of authentication technology roaming into a wireless communication system employing a second type of authentication technology. The method and apparatus involves transmitting (or receiving) a first message to a first system comprising a mobile identifier for a subscriber of the first and a second system indicator indicating that the subscriber is attempting to gain access to a second system that uses an authentication process different than an authentication process used by the first system; determining shared secret data for the subscriber using the mobile identifier; receiving (or transmitting) a second message from the first system having shared secret data associated with the subscriber; generating an expected response to a unique challenge using the shared secret data and an encryption algorithm, and transmitting the expected response to the second system.

    AN IMPROVED METHOD FOR AN AUTHENTICATION OF A USER SUBSCRIPTION IDENTITY MODULE

    公开(公告)号:CA2344757A1

    公开(公告)日:2001-12-13

    申请号:CA2344757

    申请日:2001-04-18

    Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by th e communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.

    6.
    发明专利
    未知

    公开(公告)号:DE60002700T2

    公开(公告)日:2004-04-08

    申请号:DE60002700

    申请日:2000-12-19

    Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.

    7.
    发明专利
    未知

    公开(公告)号:DE60002700D1

    公开(公告)日:2003-06-18

    申请号:DE60002700

    申请日:2000-12-19

    Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.

    An improved method for an authentication of a user subscription identity module

    公开(公告)号:AU5177701A

    公开(公告)日:2001-12-20

    申请号:AU5177701

    申请日:2001-06-06

    Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.

    AN IMPROVED METHOD FOR AN AUTHENTICATION OF A USER SUBSCRIPTION IDENTITY MODULE

    公开(公告)号:CA2344757C

    公开(公告)日:2006-05-30

    申请号:CA2344757

    申请日:2001-04-18

    Abstract: A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits sa id response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.

    10.
    发明专利
    未知

    公开(公告)号:ES2213733T3

    公开(公告)日:2004-09-01

    申请号:ES02252544

    申请日:2002-04-10

    Abstract: Disclosed is a method and apparatus for providing authentication for a subscriber of a wireless communication system employing one type of authentication technology roaming into a wireless communication system employing a second type of authentication technology. The method and apparatus involves transmitting (or receiving) a first message to a first system comprising a mobile identifier for a subscriber of the first and a second system indicator indicating that the subscriber is attempting to gain access to a second system that uses an authentication process different than an authentication process used by the first system; determining shared secret data for the subscriber using the mobile identifier; receiving (or transmitting) a second message from the first system having shared secret data associated with the subscriber; generating an expected response to a unique challenge using the shared secret data and an encryption algorithm, and transmitting the expected response to the second system.

Patent Agency Ranking