System and method for initiation of a security update
First Claim
Patent Images
1. A mobile communications device, comprising:
- logic means operable to generate an authentication key for transmitting in a registration request to a network node operable with a wireless network, said authentication key for securing a personalized indicium assigned to said mobile communications device, wherein said personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
logic means operable to execute a challenge response when challenged by a challenge message from said network node, said challenge response including an authentication value of a challenge string transmitted in said challenge message, wherein said authentication value is created using said authentication key; and
logic means for generating a challenge request for transmitting to said network node upon detection of one of the mobile communications device requiring a key, the mobile communications device acquiring a new communication channel, the mobile communications device receiving a message whose decoding reveals a descrambling error, before transmitting a message the mobile communications device discovering that it doesn'"'"'t have a scrambling key, the mobile communications device receiving a descrambling error, the mobile communications device receiving an improperly versioned packet, the mobile communications device receiving a packet of which it is not the intended recipient, and the expiry of a timer or a user initiated event.
4 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a mobile communications device that one of a list of criteria have been met, a challenge-and-response procedure is initiated by the mobile communications device. During the challenge-and-response procedure, the mobile communications device and a network node will authenticate the personalized indicium using a shared authentication key.
-
Citations
19 Claims
-
1. A mobile communications device, comprising:
-
logic means operable to generate an authentication key for transmitting in a registration request to a network node operable with a wireless network, said authentication key for securing a personalized indicium assigned to said mobile communications device, wherein said personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device;
logic means operable to execute a challenge response when challenged by a challenge message from said network node, said challenge response including an authentication value of a challenge string transmitted in said challenge message, wherein said authentication value is created using said authentication key; and
logic means for generating a challenge request for transmitting to said network node upon detection of one of the mobile communications device requiring a key, the mobile communications device acquiring a new communication channel, the mobile communications device receiving a message whose decoding reveals a descrambling error, before transmitting a message the mobile communications device discovering that it doesn'"'"'t have a scrambling key, the mobile communications device receiving a descrambling error, the mobile communications device receiving an improperly versioned packet, the mobile communications device receiving a packet of which it is not the intended recipient, and the expiry of a timer or a user initiated event. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for securing a personalized indicium assigned to a mobile communications device, comprising:
-
detecting at a network node that said mobile communications device has issued a challenge-response protocol sequence with said network node, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device, wherein said challenge-response protocol sequence is issued by said mobile communication device based upon one of the mobile communications device requiring a key, the mobile communications device acquiring a new communication channel, the mobile communications device receiving a message whose decoding reveals a descrambling error, before transmitting a message the mobile communications device discovering that it doesn'"'"'t have a scrambling key, the mobile communications device receiving a descrambling error, the mobile communications device receiving an improperly versioned packet, the mobile communications device receiving a packet of which it is not the intended recipient, and the expiry of a timer or a user initiated event;
responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (7, 8, 9)
-
-
10. A method for securing a personalized indicium assigned to a mobile communications device, comprising:
-
receiving at a network node a challenge request message from said mobile communications device, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device and wherein said mobile communications device generates said challenge request message upon detection of one of the mobile communications device requiring a key, the mobile communications device acquiring a new communication channel, the mobile communications device receiving a message whose decoding reveals a descrambling error, before transmitting a message the mobile communications device discovering that it doesn'"'"'t have a scrambling key, the mobile communications device receiving a descrambling error, the mobile communications device receiving an improperly versioned packet, the mobile communications device receiving a packet of which it is not the intended recipient, and the expiry of a timer or a user initiated event;
responsive to said receiving, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A network system for securing a personalized indicium assigned to a mobile communications device, comprising:
-
means for receiving at a network node a challenge request message from said mobile communications device, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said mobile communications device and wherein said mobile communications device generates said challenge request message upon detection of one of the mobile communications device requiring a key, the mobile communications device acquiring a new communication channel, the mobile communications device receiving a message whose decoding reveals a descrambling error, before transmitting a message the mobile communications device discovering that it doesn'"'"'t have a scrambling key, the mobile communications device receiving a descrambling error, the mobile communications device receiving an improperly versioned packet, the mobile communications device receiving a packet of which it is not the intended recipient, and the expiry of a timer or a user initiated event;
means, operable responsive to said receiving, for issuing a challenge message to said mobile communications device, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
means, operable responsive to said challenge response from said mobile communications device, for determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (16, 17, 18, 19)
-
Specification