METHOD AND APPARATUS FOR AUTHENTICATING PER M2M DEVICE BETWEEN SERVICE PROVIDER AND MOBILE NETWORK OPERATOR
First Claim
1. An operating method of an authentication server for authenticating a service per Machine to Machine (M2M) device between an M2M service provider and a mobile communication operator, the method comprising:
- generating an M2M device IDentifier (ID), a first authentication key, and an M2M service provider ID per M2M device;
based on the M2M device ID, the first authentication key, and the M2M service provider ID, generating a second authentication key, a first hash function value, and a first random variable; and
transmitting at least one of the second authentication key, the first hash function, and the first random variable to an M2M agent.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is capable of authenticating a service per Machine to Machine (M2M) device between an M2M service provider and a mobile communication operator. The system includes an authentication server for generating an M2M device IDentifier (ID), a first authentication key, and an M2M service provider ID per M2M device, The authentication server also generates a second authentication key, a first hash function value, and a first random variable based on the M2M device ID, the first authentication key, and the M2M service provider ID. and transmitting the second authentication key, the first hash function, and the first random variable to an M2M agent to an M2M agent.
-
Citations
24 Claims
-
1. An operating method of an authentication server for authenticating a service per Machine to Machine (M2M) device between an M2M service provider and a mobile communication operator, the method comprising:
-
generating an M2M device IDentifier (ID), a first authentication key, and an M2M service provider ID per M2M device; based on the M2M device ID, the first authentication key, and the M2M service provider ID, generating a second authentication key, a first hash function value, and a first random variable; and transmitting at least one of the second authentication key, the first hash function, and the first random variable to an M2M agent. - View Dependent Claims (2, 3, 4)
-
-
5. An operating method of a Machine to Machine (M2M) agent for authenticating a service per M2M device between an M2M service provider and a mobile communication operator, the method comprising:
-
receiving at least one of a second authentication key, a first hash function value, and a first random variable from an authentication server; transmitting at least one of the first hash function, the first random variable, a Home Operator IDentifier (H−
OPID), a Visited Operator ID (V−
OPID), an M2M device ID, and an M2M agent ID to an M2M server;receiving at least one of a second random variable and a second hash function value from the M2M server; and verifying the second hash function value received from the M2M server by comparing the second hash function value received from the M2M server and a second hash function value generated by the M2M agent. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. An operating method of a Machine to Machine (M2M) server for authenticating a service per M2M device between an M2M service provider and a mobile communication operator, the method comprising:
-
receiving from an M2M agent, at least one of a first hash function, a first random variable, a Home Operator IDentifier (H−
OPID), a Visited Operator ID (V−
OPID), an M2M device ID, and an M2M agent ID;verifying the first hash function value received from the M2M agent by comparing the first hash function received from the M2M agent and a first hash function value generated by the M2M server; generating at least one of a second authentication key, a second random variable, and a second hash function value using at least one of the first hash function, the first random variable, the H−
OPID, the V−
OPID, the M2M device ID, and the M2M agent ID received from the M2M agent; andtransmitting at least one of the second random variable and the second hash function value to the M2M agent. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system for authenticating a service per Machine to Machine (M2M) device between an M2M service provider and a mobile communication operator, the system comprising:
-
au authentication server configured to generate an M2M device IDentifier (ID), a first authentication key, and an M2M service provider ID per M2M device, generating a second authentication key, a first hash function value, and a first random variable based on the M2M device ID, the first authentication key, and the M2M service provider ID, and transmit the second authentication key, the first hash function, and the first random variable to an M2M agent; the M2M agent configured to; receive at least one of the second authentication key, the first hash function value, and the first random variable from the authentication server, transmit at least one of the first hash function, the first random variable, a Home Operator IDentifier (H−
OPID), a Visited Operator ID (V−
OPID), an M2M device ID, and an M2M agent ID to an M2M server,receive at least one of a second random variable and a second hash function value from the M2M server, and verify the second hash function value received from the M2M server by comparing the second hash function value received from the M2M server and a second hash function value generated by the M2M agent; and the M2M server configured to; receive, from the M2M agent, at least one of the first hash function, the first random variable, the H−
OPID, the V−
OPID, the M2M device ID, and the M2M agent ID,verify the first hash function value received from the M2M agent by comparing the first hash function received from the M2M agent and a first hash function value generated by the M2M server, generate at least one of the second authentication key, the second random variable, and the second hash function value using at least one of the first hash function, the first random variable, the H−
OPID, the V−
OPID, the M2M device ID, and the M2M agent ID received from the M2M agent, andtransmit at least one of the second random variable and the second hash function value to the M2M agent. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification