Method and apparatus for authentication in wireless communications
First Claim
1. A method of securing wireless communications with a network at a subscriber station, comprising:
- receiving a random value from the network;
calculating a first session key and a first response value as a function of the random value;
calculating a second session key and a second response value as a function of the random value, first session key and first response value; and
communicating the second response value to the network for authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of securing wireless communications between a network and a subscriber station include inserting a marker denoting an encryption type within a random value used for authentication, calculating a first session key and a first response value as a function of the random value, then calculating a second session key and a second response value as a function of the random value, first session key and first response value. The two levels of session keys and response values may be used by upgraded subscriber stations and network access points to prevent attackers from intercepting authentication triplets.
-
Citations
32 Claims
-
1. A method of securing wireless communications with a network at a subscriber station, comprising:
-
receiving a random value from the network;
calculating a first session key and a first response value as a function of the random value;
calculating a second session key and a second response value as a function of the random value, first session key and first response value; and
communicating the second response value to the network for authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of securing wireless communications with a subscriber station from a network, comprising:
-
generating a random value having a marker specifying an encryption type;
calculating a first session key and a first response value as a function of the random value;
calculating a second session key and a second response value as a function of the random value, first session key and first response value;
communicating the random value to the subscriber station;
receiving a subscriber response value from the subscriber station in response to the random value; and
comparing the subscriber response value to each of the first and second response values. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A subscriber station, comprising:
-
means for receiving a random value from the network;
means for calculating a first session key and a first response value as a function of the random value, and further for calculating a second session key and a second response value as a function of the random value, first session key and first response value;
means for communicating the second response value to the network for authentication; and
means for applying the second session key to encryption of data for transmission.
-
-
26. A network, comprising:
-
means for generating a random value comprising a marker specifying an encryption type;
means for calculating a first session key and a first response value as a function of the random value;
means for calculating a second session key and a second response value as a function of the random value, first session key and first response value;
means for communicating the random value to the subscriber station;
means for receiving a subscriber response value from the subscriber station in response to the random value; and
means for comparing the subscriber response value to each of the first and second response values. - View Dependent Claims (32)
-
-
27. A subscriber station, comprising:
-
a receiver configured to receive a random value from the network;
a processor system configured to calculate a first session key and a first response value as a function of the random value, and calculate a second session key and a second response value as a function of the random value, first session key and first response value;
an encryption unit adapted to receive the second session key for encryption and decryption of transmission data; and
a transmitter configured to send the second response value to the network for authentication. - View Dependent Claims (28, 29, 30, 31)
-
Specification