Network authentication
0 Assignments
0 Petitions
Accused Products
Abstract
An existing communications device, such as a WAP-enabled mobile phone or other device, can be used as an authentication token. This has the advantage that WAP-enabled devices include components which are used in public key/private key cryptographic systems as a part of their standard communication functions. These components therefore advantageously allow the device to be used as an authentication token when communicating with a remote server.
27 Citations
39 Claims
-
1-27. -27. (canceled)
-
28. A method of operating a mobile communications device that includes a cryptographic module, the method comprising:
-
detecting whether a node accessed by the mobile communications device via a wireless network requires performance of an authentication, and in response to detecting that the node accessed by the mobile communications device via the wireless network requires performance of the authentication, using the cryptographic module to carry out the authentication; and
detecting whether a local external device having a connection to a network by means other than the mobile communications device requires performance of an authentication, and in response to detecting that the local external device requires performance of the authentication, using the cryptographic module to carry out the authentication. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A mobile communications device comprising:
-
a cryptographic module;
means for detecting whether a node accessed by the mobile communications device via a wireless network requires performance of an authentication, and in response to detecting that the node accessed by the mobile communications device via the wireless network requires performance of the authentication, uses the cryptographic module to carry out the authentication; and
means for detecting whether a local external device having a connection to a network by means other than the mobile communications device requires performance of an authentication, and in response to detecting that the local external device requires performance of the authentication, uses the cryptographic module to carry out the authentication. - View Dependent Claims (35, 36, 37, 38, 39)
-
Specification