SIM BASED AUTHENTICATION
First Claim
1. A method of authentication in a communications network (100), said communications network (100) comprising a network authentication server (102), a local authentication entity (104) and a user terminal (112), said local authentication entity (112) comprising a subscriber application (108) and an authentication application (110), said method comprising the steps of:
- (i) sending (208) a request from the local authentication entity (104) to the network authentication server (102) to authenticate the user terminal (112), said request comprising the identity of the user terminal (112);
(ii) generating (212) by the network authentication entity (102) an authentication key (122) in response to the request and generating (214) by the subscriber application (108) an identical authentication key (124);
(iii) sending the authentication key generated by the network authentication server (102) securely to the user terminal (112) identified by said identity, then storing the authentication key at the user terminal (112);
(iv) sending the authentication key generated by the subscriber application (108) securely to the authentication application (110), then storing the authentication key at the authentication application (110); and
(v) authenticating the user terminal (112) by verifying the authentication key stored at the user terminal (112) with the authentication key stored at the authentication application (110).
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authentication in a communications network, said communications network comprising a network authentication server, a local authentication entity and a user terminal, said local authentication entity comprising a subscriber application and an authentication application, said method comprising the steps of: sending a request from the local authentication entity to the network authentication server to authenticate the user terminal, said request comprising the identity of the user terminal; generating by the network authentication entity an authentication key in response to the request and generating by the subscriber application an identical authentication key; sending the authentication key generated by the network authentication server securely to the user terminal identified by said identity, then storing the authentication key at the user terminal; sending the authentication key generated by the subscriber application securely to the authentication application, then storing the authentication key at the authentication application; and authenticating the user terminal by verifying the authentication key stored at the user terminal with the authentication key stored at the authentication application.
39 Citations
16 Claims
-
1. A method of authentication in a communications network (100), said communications network (100) comprising a network authentication server (102), a local authentication entity (104) and a user terminal (112), said local authentication entity (112) comprising a subscriber application (108) and an authentication application (110), said method comprising the steps of:
-
(i) sending (208) a request from the local authentication entity (104) to the network authentication server (102) to authenticate the user terminal (112), said request comprising the identity of the user terminal (112); (ii) generating (212) by the network authentication entity (102) an authentication key (122) in response to the request and generating (214) by the subscriber application (108) an identical authentication key (124); (iii) sending the authentication key generated by the network authentication server (102) securely to the user terminal (112) identified by said identity, then storing the authentication key at the user terminal (112); (iv) sending the authentication key generated by the subscriber application (108) securely to the authentication application (110), then storing the authentication key at the authentication application (110); and (v) authenticating the user terminal (112) by verifying the authentication key stored at the user terminal (112) with the authentication key stored at the authentication application (110). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A communications network (100) comprising a comprising a network authentication server (102), a local authentication entity (104) and a user terminal (112), said local authentication entity (112) comprising a subscriber application (108) and an authentication application (110), wherein:
-
the local authentication entity (104) is adapted to send a request to the network authentication server (102) to authenticate the user terminal (112), wherein said request comprises the identity of the user terminal (112); the network authentication server (102) is adapted to generate in response to a request to authenticate from the local authentication entity (104) an authentication key (122), and to send the authentication key securely to the user terminal (112) identified by the identity in the request; the user terminal (112) is adapted to store an authentication key sent by the network authentication server (102); the subscriber application (108) is adapted to generate an authentication key (124) and to send the authentication key securely to the authentication application (110); and the authentication application (110) is adapted to store the authentication key sent by the subscriber application (108) and to authenticate the user terminal (112) by verifying the authentication key stored at the user terminal (112) with the authentication key stored at the authentication application (110).
-
Specification