-
公开(公告)号:CA2544967A1
公开(公告)日:2005-05-26
申请号:CA2544967
申请日:2004-11-10
Applicant: QUALCOMM INC
Inventor: PADDON MICHAEL , ROSE GREGORY G , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing GSM wireless communications between a networ k and a subscriber station are disclosed. One embodiment creates authenticatio n triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.
-
公开(公告)号:DE602004011554D1
公开(公告)日:2008-03-13
申请号:DE602004011554
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:AT385157T
公开(公告)日:2008-02-15
申请号:AT04810234
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:DE602004011554T2
公开(公告)日:2008-05-21
申请号:DE602004011554
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:BRPI0416233A
公开(公告)日:2007-01-02
申请号:BRPI0416233
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , HAWKES PHILIP M , SEMPLE JAMES F
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
公开(公告)号:CA2544665A1
公开(公告)日:2005-05-26
申请号:CA2544665
申请日:2004-11-01
Applicant: QUALCOMM INC
Inventor: ROSE GREGORY G , PADDON MICHAEL , SEMPLE JAMES F , HAWKES PHILIP M
Abstract: Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
-
-
-
-