GSM authentication in a CDMA network
First Claim
Patent Images
1. A subscriber station, comprising:
- a processor having an authentication algorithm for a first network, the processor further being configured to use a key for a second network in the authentication algorithm to establish a session with the second network.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and techniques for secured communications from a subscriber station is disclosed. The subscriber station includes a processor having an authentication algorithm for a first network. The processor is configured to use a key for a second network in the authentication algorithm to establish a session with the second network.
-
Citations
31 Claims
-
1. A subscriber station, comprising:
a processor having an authentication algorithm for a first network, the processor further being configured to use a key for a second network in the authentication algorithm to establish a session with the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A subscriber station, comprising:
a processor having an authentication algorithm configured to receive a first key for a first network, and a SIM configured to generate a second key for a second network, the processor further being configured to use the second key in place of the first key in the authentication algorithm to establish a session with the second network. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
25. A method of secured communications from a subscriber station having an authentication algorithm for a first network, comprising:
-
generating a key for a second network; and
using the key in the authentication algorithm to establish a session with the second network. - View Dependent Claims (26, 27, 28, 29)
-
-
30. An apparatus, comprising:
-
means for generating a key for a second network; and
means for using the key in the authentication algorithm to establish a session with the second network.
-
-
31. Computer readable media embodying a program of instructions executable by a computer to perform a method of secured communications from a subscriber station having an authentication algorithm for a first network, the method comprising:
-
generating a key for a second network; and
using the key in the authentication algorithm to establish a session with the second network.
-
Specification