Providing multimedia system security to removable user identity modules
First Claim
Patent Images
1. A method of authenticating at least one user identity module and an entry node of a wireless communication system, comprising:
- receiving, from the entry node, at least a first challenge formed according to at least a first security protocol;
forming, according to at least a second security protocol different from the first security protocol, at least a second challenge based on the first challenge; and
providing the second challenge to the user identity module.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method of authenticating a user identity module to an entry node of a wireless communication system. The method may include receiving a first challenge formed according to a first security protocol from the entry node and forming, according to a second security protocol different from the first security protocol, a second challenge based on the first challenge. The method may also include providing the second challenge to the user identity module.
73 Citations
28 Claims
-
1. A method of authenticating at least one user identity module and an entry node of a wireless communication system, comprising:
-
receiving, from the entry node, at least a first challenge formed according to at least a first security protocol;
forming, according to at least a second security protocol different from the first security protocol, at least a second challenge based on the first challenge; and
providing the second challenge to the user identity module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of authenticating a user identity module associated with at least one mobile unit, comprising:
-
providing at least a first challenge formed according to at least a first security protocol to the mobile unit;
receiving at least a first response formed based on at least a second response provided to the mobile unit by the user identity module, the second response being formed based on the first challenge according to a second security protocol different from the first security protocol; and
authenticating the user identity module based on the first response. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification