AUTHENTICATION OF A MOBILE DEVICE BY A NETWORK AND KEY GENERATION
First Claim
1. A method in a mobile device comprising:
- participating in at least a portion of an asymmetric key agreement protocol with a network to compute a secret value;
obtaining a response value derived from the secret value;
sending the response value to a verification entity for use in authenticating the mobile device.
6 Assignments
0 Petitions
Accused Products
Abstract
There are disclosed systems and methods for authenticating a mobile device by a network and/or for generating one or more keys that can be used for securely transmitting data between the mobile device and the network. In one embodiment, the following operations are performed by a mobile device: (i) the mobile device participates in at least a portion of a key agreement protocol with a network to compute a secret value; (ii) the mobile device obtains a response value derived from the secret value; and (iii) the mobile device sends the response value to a verification entity for use in authenticating the mobile device. There are also disclosed systems and methods for authenticating a network by a mobile device.
-
Citations
20 Claims
-
1. A method in a mobile device comprising:
-
participating in at least a portion of an asymmetric key agreement protocol with a network to compute a secret value; obtaining a response value derived from the secret value; sending the response value to a verification entity for use in authenticating the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for implementing a cryptographic system, the cryptographic system configured to:
-
participate in at least a portion of an asymmetric key agreement protocol with a network to compute a secret value; obtain a response value derived from the secret value; send the response value to a verification entity for use in authenticating the apparatus. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A processor readable medium having stored thereon processor readable instructions that, when executed, cause a mobile device to:
-
participate in at least a portion of an asymmetric key agreement protocol with a network to compute a secret value; obtain a response value derived from the secret value; send the response value to a verification entity for use in authenticating the mobile device.
-
Specification