Communications security
First Claim
1. A method of authenticating a device'"'"'s access to a communications node, the method comprising:
- generating by the communications node, a first value for use in derivation of a first encryption key, the first encryption key being at least partially used to authenticate the device'"'"'s access to the communications node in a first communications exchange;
modifying by the communications node, independent of the device, the first value to create a second value; and
using the second value, by the communication node, in authenticating the device'"'"'s access to the communications node in a second communications exchange.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating a device'"'"'s access to a communications node is disclosed. The method of operation includes the communications node generating a first value for use in the derivation of a first encryption key, the first encryption key being at least partially used to authenticate the device'"'"'s access to the communications node in a first communications exchange. The method of operation includes the communications node modifying the first value, independent of the device, to create a second value. The method includes the communications node using the second value in authenticating the device'"'"'s access to the communications node in a second communications exchange. Embodiments of the present invention include but are not limited to communications nodes and devices, subsystems, and systems equipped to operate in the above-described manner.
-
Citations
24 Claims
-
1. A method of authenticating a device'"'"'s access to a communications node, the method comprising:
-
generating by the communications node, a first value for use in derivation of a first encryption key, the first encryption key being at least partially used to authenticate the device'"'"'s access to the communications node in a first communications exchange;
modifying by the communications node, independent of the device, the first value to create a second value; and
using the second value, by the communication node, in authenticating the device'"'"'s access to the communications node in a second communications exchange. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a device'"'"'s access to a communications node, the method comprising:
-
the device communicating with the communications node in a first communications exchange, the device being authenticated to the communications node using a first encryption key derived from a first value generated by the communications node;
modifying by the device, independent of the communications node, the first value to create a second value; and
the device communicating with the communications node in a second communications exchange, using the second value, the device being authenticated to the communications node using a copy of the second value independently generated by the communications node. - View Dependent Claims (9, 10)
-
-
11. A communications node comprising:
-
a transmitter; and
a controller coupled to the transmitter, the controller designed to generate a first value for use in derivation of a first encryption key, the first encryption key being at least partially used to authenticate a device'"'"'s access to the communications node in a first communications exchange, the controller designed to modify, independent of the device, the first value to create a second value, the controller designed to use the second value in authenticating the device'"'"'s access to the communications node in a second communications exchange. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
one or more substantially omnidirectional antenna(e), designed to at least facilitate transmission of communication signals; and
a communications node including;
a transmitter, the transmitter coupled to at least one of the one or more substantially omnidirectional antenna(e), and a controller coupled to the transmitter, the controller designed to generate a first value for use in derivation of a first encryption key, the first encryption key being at least partially used to authenticate the device'"'"'s access to the communications node in a first communications exchange, the controller designed to modify, independent of the device, the first value to create a second value, the controller designed to use the second value in authenticating the device'"'"'s access to the communications node in a second communications exchange. - View Dependent Claims (19, 20, 21)
-
-
22. A controller readable medium comprising:
-
a storage medium; and
a plurality of instructions stored in the storage medium, the instructions designed to enable an apparatus to generate a first value for use in derivation of a first encryption key, the first encryption key being at least partially used to authenticate a device'"'"'s access to the apparatus in a first communications exchange, modify, independent of the device, the first value to create a second value, and use the second value in authenticating the device'"'"'s access to the apparatus in a second communications exchange. - View Dependent Claims (23, 24)
-
Specification