Terminal identity masking in a wireless network
First Claim
1. A method performed by a user terminal of a wireless access network, the method comprising:
- scrambling a user terminal certificate using a shared secret to be known only by the user terminal and an access point of the wireless access network; and
sending a message to the access point, the message including the scrambled user terminal certificate.
2 Assignments
0 Petitions
Accused Products
Abstract
The certificate issued by a certificate authority used in authenticating a user terminal can be scrambled prior to being set to an access point. In one embodiment, the present invention includes a user terminal having a memory in which a user terminal certificate is stored. The user terminal also has a processor coupled to the memory to scramble the user terminal certificate using a shared secret to be known only by the user terminal and an access point of the wireless access network, and a transmitter coupled to the processor to send a message to the access point, the message including the scrambled user terminal certificate.
32 Citations
33 Claims
-
1. A method performed by a user terminal of a wireless access network, the method comprising:
-
scrambling a user terminal certificate using a shared secret to be known only by the user terminal and an access point of the wireless access network; and
sending a message to the access point, the message including the scrambled user terminal certificate. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A user terminal comprising:
-
a memory to store a user terminal certificate;
a processor coupled to the memory to scramble the user terminal certificate using a shared secret to be known only by the user terminal and an access point of the wireless access network; and
a transmitter coupled to the processor to send a message to the access point, the message including the scrambled user terminal certificate. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method performed by an access point of a wireless access network, the method comprising:
-
receiving a message from a user terminal of the wireless access network, the message containing a shared secret encrypted with an access point public key, and a user terminal certificate scrambled using the shared secret;
decrypting the shared secret using an access point private key; and
unscrambling the user terminal certificate using the decrypted shared secret. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An access point comprising:
-
a receiver to receive a message from a user terminal, the message containing a shared secret encrypted with an access point public key and a user terminal certificate scrambled using the shared secret; and
a processor coupled to the receiver to decrypt the shared secret using an access point private key, and unscramble the user terminal certificate using the decrypted shared secret. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A machine-readable medium storing data representing instructions that, when performed by a processor of a user terminal, causes the processor to perform operations comprising:
-
scrambling a user terminal certificate using a shared secret to be known only by the user terminal and an access point of the wireless access network; and
sending a message to the access point, the message including the scrambled user terminal certificate. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A machine-readable medium storing data representing instructions that, when performed by a processor of an access point, causes the processor to perform operations comprising:
-
receiving a message from a user terminal of the wireless access network, the message containing a shared secret encrypted with an access point public key, and a user terminal certificate scrambled using the shared secret;
decrypting the shared secret using an access point private key; and
unscrambling the user terminal certificate using the decrypted shared secret. - View Dependent Claims (30, 31, 32, 33)
-
Specification