MANIPULATION AND RESTORATION OF AUTHENTICATION CHALLENGE PARAMETERS IN NETWORK AUTHENTICATION PROCEDURES
First Claim
1. An apparatus, comprising:
- a processor and a memory communicatively connected to the processor, the processor configured to;
receive an authentication challenge parameter; and
determine whether the authentication challenge parameter is encrypted.
12 Assignments
0 Petitions
Accused Products
Abstract
A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (MD) and a subscriber server (SS) each have provisioned therein a binding key (B-KEY) that is associated with a subscriber identity of a network authentication module (NAM) of the MD. The SS obtains an authentication vector (AV) in response to a request from a Radio Access Network (RAN) when the MD attempts to attach to the RAN. The AV includes an original authentication challenge parameter (ACP). The SS encrypts the original ACP based on its B-KEY, and updates the AV by replacing the original ACP with the encrypted ACP. The MD receives the encrypted ACP, and decrypts the encrypted ACP based on its B-KEY to recover the original ACP. The MD provides the original ACP to the NAM for use in computing an authentication response for validation by the RAN.
26 Citations
23 Claims
-
1. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to; receive an authentication challenge parameter; and determine whether the authentication challenge parameter is encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A method for use by a mobile device comprising a processor and a memory, the method comprising:
-
receiving, by the processor, an authentication challenge parameter; and determining, by the processor, whether the authentication challenge parameter is encrypted.
-
-
13. An apparatus, comprising:
a processor and a memory communicatively connected to the processor, the processor configured to; encrypt an original authentication challenge parameter of an authentication vector (AV), based on a binding key, to form an encrypted authentication challenge parameter; and replace the original authentication challenge parameter of the AV with the encrypted authentication challenge parameter. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
23. A method, comprising:
-
encrypting, using a processor, an original authentication challenge parameter of an authentication vector (AV), based on a binding key, to form an encrypted authentication challenge parameter; and replacing the original authentication challenge parameter of the AV with the encrypted authentication challenge parameter.
-
Specification