Method of generating an authentication
First Claim
1. A method of generating an authentication for updating a mobile communications device'"'"'s location to a second communications device, the mobile communications device being registered to a proxy server, the method comprising the steps of, at the time of performing the location update, i. providing a first input from the proxy server and a second input from the second communications device to a first algorithm to generate a shared secret, ii. using the shared secret as the authentication when transmitting the location update to the second communications device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of generating an authentication for updating a mobile communications device'"'"'s 40 location to a second communications device 60 is disclosed herein. The mobile communications device 40 is registered to a home network 30 comprising a proxy server but roams to a foreign network 40 with a different network number. The method proposes that, at the time of performing the location update, the second communications device and the proxy server each provides an input to a hash function to generate a shared secret; and using the shared secret as the authentication when the proxy server or the mobile communications device transmits the location update to the second communications device.
25 Citations
17 Claims
-
1. A method of generating an authentication for updating a mobile communications device'"'"'s location to a second communications device, the mobile communications device being registered to a proxy server, the method comprising the steps of, at the time of performing the location update,
i. providing a first input from the proxy server and a second input from the second communications device to a first algorithm to generate a shared secret, ii. using the shared secret as the authentication when transmitting the location update to the second communications device.
Specification