Methods of authenticating electronic devices in mobile networks
First Claim
Patent Images
1. A method of authenticating an electronic device, the method comprising steps of:
- receiving an authentication request from the electronic device in a mobile network;
searching for an authentication credential at a first mobile network controller by searching in a local database of the first mobile network controller; and
searching for an alternate authentication server to fulfill the authentication request, if the authentication credential is not found in the local database of the first mobile network controller.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to methods of authenticating an electronic device in a mobile network. A method of authenticating an electronic device comprises a first mobile network controller receiving an authentication request from the electronic device in a mobile network 105; searching for an authentication credential 110 at a first mobile network controller by searching in a local database of the first mobile network controller; and, searching for an alternate authentication server to fulfill the authentication request 115, if the authentication credential is not found in the local database of the first mobile network controller.
-
Citations
20 Claims
-
1. A method of authenticating an electronic device, the method comprising steps of:
-
receiving an authentication request from the electronic device in a mobile network;
searching for an authentication credential at a first mobile network controller by searching in a local database of the first mobile network controller; and
searching for an alternate authentication server to fulfill the authentication request, if the authentication credential is not found in the local database of the first mobile network controller. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of authenticating an electronic device, the method comprising steps of:
-
receiving a query for an authentication request from the electronic device in a mobile network;
detecting a need for scanning at least one mobile network controller in the mobile network; and
,fulfilling the authentication request. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating an electronic device, the method comprising steps of:
-
at a second mobile network controller;
receiving a query for an authentication request for the electronic device in a mobile network from a first mobile network controller;
determining whether the first mobile network controller is included in an untrusted list; and
,fulfilling the authentication request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification