System and method for securing a personalized indicium assigned to a mobile communications device
First Claim
Patent Images
1. A method for securing a personalized indicium assigned to a mobile communications device, comprising:
- detecting at a network node that an address associated with said mobile communications device has changed, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device.
4 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
38 Citations
47 Claims
-
1. A method for securing a personalized indicium assigned to a mobile communications device, comprising:
-
detecting at a network node that an address associated with said mobile communications device has changed, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A mobile communications device, comprising:
-
logic means operable to generate an authentication key for transmitting in a registration request to a network node operable with a wireless network, said authentication key for securing a personalized indicium assigned to said mobile communications device, wherein said personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device; and
logic means operable to execute a challenge response when challenged by a challenge message from said network node, said challenge response including an authentication value of a challenge string transmitted in said challenge message, wherein said authentication value is created using said authentication key. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A network system for securing a personalized indicium assigned to a mobile communications device, comprising:
-
means for detecting at a network node that an address associated with said mobile communications device has changed, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
means, operable responsive to said detecting, for issuing a challenge message to said mobile communications device, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
means, operable responsive to said challenge response from said mobile communications device, for determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for securing a personalized indicium assigned to a mobile communications device, comprising:
-
detecting at a network node that said mobile communications device has issued a challenge-response protocol sequence with said network node, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification