Communications Device Authentication
First Claim
Patent Images
1. A method of accessing a resource requiring identity authentication, the method comprising:
- receiving at a communications device an encrypted token in response to an identity of the communications device being authenticated over a first radio access technology;
decrypting the encrypted token using the identity of the communications device; and
using the decrypted token over a second radio access technology to authenticate the identity of the communications device so as to allow access to the resource via the second radio access technology.
1 Assignment
0 Petitions
Accused Products
Abstract
There is described a method of accessing a resource requiring identity authentication, the method comprising: receiving at a communications device an encrypted token in response to an identity of the communications device being authenticated over a first radio access technology; decrypting the encrypted token using the identity of the communications device; and using the decrypted token over a second radio access technology to authenticate the identity of the communications device so as to allow access to the resource via the second radio access technology.
43 Citations
15 Claims
-
1. A method of accessing a resource requiring identity authentication, the method comprising:
-
receiving at a communications device an encrypted token in response to an identity of the communications device being authenticated over a first radio access technology; decrypting the encrypted token using the identity of the communications device; and using the decrypted token over a second radio access technology to authenticate the identity of the communications device so as to allow access to the resource via the second radio access technology. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15)
-
-
14. A communications device for accessing a resource requiring identity authentication, comprising:
-
a receiver configured to receive an encrypted token in response to an identity of the communications device being authenticated over a first radio access technology; a decrypter configured to decrypt the encrypted token using the identity of the communications device; and a transmitter configured to use the decrypted token in a transmission over a second radio access technology to authenticate the identity of the communications device so as to allow access to a resource via the second radio access technology.
-
Specification