AUTHENTICATION IN A WIRELESS COMMUNICATIONS NETWORK
First Claim
1. A method of authenticating a mobile device in a second network, the mobile device already being authenticated in a first network, the method comprising, at an authentication device in the first network;
- generating an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device;
sending the generated authentication master key to a second authentication device in the second network; and
wherein the generated authentication master key is usable by the second authentication device to authenticate the mobile device in the second network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for authenticating a mobile device in a second network when the mobile device is already authenticated in a first network. An authentication device in the first network generates an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device. The generated authentication master key is sent to a second authentication device in the second network, where is usable by the second authentication device to authenticate the mobile device in the second network.
33 Citations
20 Claims
-
1. A method of authenticating a mobile device in a second network, the mobile device already being authenticated in a first network, the method comprising, at an authentication device in the first network;
-
generating an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device; sending the generated authentication master key to a second authentication device in the second network; and wherein the generated authentication master key is usable by the second authentication device to authenticate the mobile device in the second network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18, 19, 20)
-
-
9. A method of authenticating a mobile device in a second network, the mobile device already being authenticated in a first network, the method comprising, at an authentication device in the second network;
-
receiving a generated authentication master key from a first network authentication device, the authentication master key having been generated using a first nonce generated by the first network authentication device and a second nonce generated by the mobile device; using the generated authentication master key to authenticate the mobile device in the second network. - View Dependent Claims (10, 11)
-
-
12. A device arranged to generate an authentication master key for authenticating a mobile device in a second network, the mobile device already being authenticated in a first network, the device comprising:
a processor arranged to generate the authentication master key associated with the mobile device using a first nonce generated by an authentication device in the first network, and a second nonce generated by the mobile device; and - View Dependent Claims (13, 14, 15, 16, 17)
Specification