DEVICE, METHOD AND APPARATUS FOR AUTHENTICATION ON UNTRUSTED NETWORKS VIA TRUSTED NETWORKS
First Claim
Patent Images
1. A method for authenticating a mobile device on an untrusted network via a trusted network, the method comprising:
- transmitting, by the mobile device, a first service request message via the trusted network;
acquiring credential information via the trusted network;
transmitting a second service request message via the untrusted network, the second service request message comprising the credential information; and
receiving service via the untrusted network based on the credential information in the second service request message.
1 Assignment
0 Petitions
Accused Products
Abstract
The described apparatus and methods may include a security agent configured to transmit a first service request message via a trusted network, and acquire credential information via the trusted network. The security agent is further configured to transmit a second service request message via an untrusted network, wherein the second service request message comprising the credential information. The security agent is further configured to receive service via the untrusted network based on the credential information in the second service request message.
-
Citations
37 Claims
-
1. A method for authenticating a mobile device on an untrusted network via a trusted network, the method comprising:
-
transmitting, by the mobile device, a first service request message via the trusted network; acquiring credential information via the trusted network; transmitting a second service request message via the untrusted network, the second service request message comprising the credential information; and receiving service via the untrusted network based on the credential information in the second service request message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless communication apparatus, comprising:
a security agent configured to; transmit a first service request message via a trusted network; acquire credential information via the trusted network; transmit a second service request message via an untrusted network, the second service request message comprising the credential information; and receive service via the untrusted network based on the credential information in the second service request message. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
18. An apparatus comprising:
-
means for transmitting, by a mobile device, a first service request message via a trusted network; means for acquiring credential information via the trusted network; means for transmitting a second service request message via an untrusted network, the second service request message comprising the credential information; and means for receiving service via the untrusted network based on the credential information in the second service request message.
-
-
19. A computer program product, comprising:
a computer-readable medium comprising; at least one instruction for causing a computer to transmit, by a mobile device, a first service request message via a trusted network; at least one instruction for causing the computer to acquire credential information via the trusted network; at least one instruction for causing the computer to transmit a second service request message via an untrusted network, the second service request message comprising the credential information; and at least one instruction for causing the computer to receive service via the untrusted network based on the credential information in the second service request message.
-
20. A wireless communications apparatus, comprising:
at least one processor configured to; transmit, by a mobile device, a first service request message via a trusted network; acquire credential information via the trusted network; transmit a second service request message via an untrusted network, the second service request message comprising the credential information; and receive service via the untrusted network based on the credential information in the second service request message.
-
21. A method for authenticating a mobile device on an untrusted network via a trusted network, the method comprising:
-
receiving, at a service provider, a first service request message via the trusted network; generating credential information; transmitting the credential information via the trusted network; receiving a second service request message via the untrusted network, the second service request message comprising the credential information; and transmitting service via the untrusted network based on the credential information in the second service request message. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A wireless communication apparatus, comprising:
a service provider configured to; receive a first service request message via a trusted network; generate credential information; transmit the credential information via the trusted network; receive a second service request message via an untrusted network, the second service request message comprising the credential information; and transmit service via the untrusted network based on the credential information in the second service request message. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
35. An apparatus comprising:
-
means for receiving, at a service provider, a first service request message via a trusted network; means for generating credential information; means for transmitting the credential information via the trusted network; means for receiving a second service request message via an untrusted network, the second service request message comprising the credential information; and means for transmitting service via the untrusted network based on the credential information in the second service request message.
-
-
36. A computer program product, comprising:
a computer-readable medium comprising; at least one instruction for causing a computer to receive, at a service provider, a first service request message via a trusted network; at least one instruction for causing a computer to generating credential information; at least one instruction for causing the computer to transmit the credential information via the trusted network; at least one instruction for causing the computer to receive a second service request message via an untrusted network, the second service request message comprising the credential information; and at least one instruction for causing the computer to transmit service via the untrusted network based on the credential information in the second service request message.
-
37. A wireless communications apparatus, comprising:
at least one processor configured to; receive a first service request message via a trusted network; generate credential information; transmit the credential information via the trusted network; receive a second service request message via an untrusted network, the second service request message comprising the credential information; and transmit service via the untrusted network based on the credential information in the second service request message.
Specification