Performing authentication in a communications system
First Claim
1. A method for authentication in a communications system, the method comprising:
- receiving a request for authentication from a server, the request for authentication including a first and a second random challenge;
comparing the first random challenge and the second random challenge;
denying the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge; and
transmitting an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for performing authentication in a communications system is provided. The method includes receiving a request for authentication from a server, the request for authentication including a first and a second random challenge, and comparing the first random challenge and the second random challenge. The method further includes denying the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge, and transmitting an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server.
-
Citations
30 Claims
-
1. A method for authentication in a communications system, the method comprising:
-
receiving a request for authentication from a server, the request for authentication including a first and a second random challenge;
comparing the first random challenge and the second random challenge;
denying the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge; and
transmitting an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for performing authentication in a communications system, the apparatus comprising:
-
a receiver adapted to receive a request for authentication from a server, the request for authentication including a first and a second random challenge; and
a control unit communicatively coupled to the receiver, the control unit adapted to;
compare the first random challenge and the second random challenge;
deny the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge; and
transmit an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is generated based on the first and second random challenge and a key that is not shared with the server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a server having access to a plurality of challenges and to a plurality of associated values generated based on a key that is not accessible to the server, the server being adapted to transmit a request for authentication including at least a first and a second challenge from the plurality of challenges; and
an apparatus to;
compare the first random challenge and the second random challenge;
deny the request for authentication in response to determining that the first random challenge is substantially the same as the second random challenge; and
transmit an encoded value to the server in response to determining that the first random challenge is different from the second random challenge, wherein the encoded value is based on at least a portion of the values associated with the first and second random challenges and the secret key. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method, comprising:
-
determining one or more challenges to transmit to an access terminal;
determining a message authentication code value for the one or more challenges, comprising;
determining a cipher key associated with each of the one or more challenges;
determining a signed response associated with each of the one or more challenges; and
determining a master key based on one or more of the cipher keys and the signed responses to determine the message authentication code; and
transmitting the one or more challenges and the message authentication code to the access terminal. - View Dependent Claims (28, 29, 30)
-
Specification