Network authentication
First Claim
Patent Images
1. A method of authenticating communications, the method comprising:
- using a mobile communications device, which includes a cryptographic module for use in mobile communication, as an authentication token.
1 Assignment
0 Petitions
Accused Products
Abstract
An existing communications device, such as a WAP-enabled mobile phone or other device, can be used as an authentication token.
This has the advantage that WAP-enabled devices include components which are used in public key/private key cryptographic systems as a part of their standard communication functions. These components therefore advantageously allow the device to be used as an authentication token when communicating with a remote server.
67 Citations
27 Claims
-
1. A method of authenticating communications, the method comprising:
using a mobile communications device, which includes a cryptographic module for use in mobile communication, as an authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A mobile communications device, comprising a cryptographic module, the cryptographic module being usable:
-
(a) for encoding wireless communications from the device;
(b) for authenticating a user of the device towards an authentication server. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A WAP-enabled mobile communications device, which is capable of use as an authentication token.
-
22. A communications network, comprising:
-
at least one WAP gateway, which is enabled to encrypt communications on the basis of Wireless Transport Layer Security;
at least one authentication server operable in a first authentication protocol; and
a WAP-enabled client device, including a cryptographic module, the cryptographic module being usable for encrypting communications with the WAP gateway using Wireless Transport Layer Security, and the cryptographic module being further usable as an authentication token for authenticating a user of the device towards the authentication server, using the first authentication protocol. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification