Method for validating a communication link
First Claim
1. A method for validating a communication link between a cordless base station and authorization equipment, said cordless base station being coupled to a telephone network and adapted to communicate with a wireless communication device, the method comprising the steps of:
- authenticating said cordless base station to communicate with said authorization equipment, said step of authenticating said cordless base station being based upon a first random number generated within said authorization equipment;
authenticating said authorization equipment to communicate with said cordless base station, said step of authenticating said authorization equipment being based upon a second random number generated within said cordless base station; and
allowing a communication link between said cordless base station and said authorization equipment when said cordless base station and said authorization equipment have been authenticated.
4 Assignments
0 Petitions
Accused Products
Abstract
The method of the present invention generally validates a communication link in a communication system. In particular, the method validates a communication link between a cordless base station and authorization and call routing equipment by authenticating the cordless base station to communicate with said authorization equipment (603) and authenticating the authorization equipment to communicate with the cordless base station (604). Preferrably, the step of authenticating the cordless base station is based upon a first random number generated within the authorization equipment (502) and the step of authenticating the authorization equipment is based upon a second random number generated within the cordless base station (504). A communication link is allowed between the cordless base station and the authorization equipment when both the cordless base station and the authorization equipment have been authenticated (614).
173 Citations
17 Claims
-
1. A method for validating a communication link between a cordless base station and authorization equipment, said cordless base station being coupled to a telephone network and adapted to communicate with a wireless communication device, the method comprising the steps of:
-
authenticating said cordless base station to communicate with said authorization equipment, said step of authenticating said cordless base station being based upon a first random number generated within said authorization equipment; authenticating said authorization equipment to communicate with said cordless base station, said step of authenticating said authorization equipment being based upon a second random number generated within said cordless base station; and allowing a communication link between said cordless base station and said authorization equipment when said cordless base station and said authorization equipment have been authenticated. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for validating a wired communication link between a base station and a second device connected in a telecommunication network, the method comprising the steps of:
-
(a) transmitting a first authentication request signal from said second device to said base station, said first authentication request signal having a first random number; (b) generating within said base station a first authentication result based upon said first random number; (c) generating within said second device a second authentication result based upon said first random number; (d) comparing said first authentication result and said second authentication result to authenticate said base station; (e) transmitting a second authentication request signal from said base station to said second device, said second authentication request signal including a second random number; (f) generating within said second device a third authentication result based upon said second random number; (g) generating within said base station a fourth authentication result based upon said second random number; and (h) comparing said third authentication result and said fourth authentication result to authenticate said second device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for authenticating a cordless base station operating in a communication system having authorization equipment, said cordless base station having an identification code associated therewith, the method comprising the steps of:
-
transmitting an authentication request from said authorization equipment to said cordless base station, said authentication request including a random number generated at said authorization equipment; generating a first authentication result based upon said random number and a first identification number; transmitting said first authentication result to said authorization equipment; transmitting said identification code associated with said cordless base station to said authorization equipment; generating a second authentication result at said authorization equipment based upon said random number and said first identification number; and comparing said first authentication result and said second authentication result to authenticate said cordless base station.
-
-
15. A method for authenticating authorization equipment operating in a communication system having a cordless base station coupled to a telephone network, said cordless base station having an identification code associated therewith, the method comprising the steps of:
-
transmitting an authentication request from said cordless base station to said authorization equipment, said authentication request including a random number generated at said cordless base station and a first identification number; generating a first authentication result at said cordless base station, said first authentication result being based upon said random number and said first identification number; generating a second authentication result at said authorization equipment based upon said random number and said cordless base station identification code; transmitting said second authentication result to said cordless base station; and comparing said first authentication result and said second authentication result to authenticate said authentication equipment.
-
-
16. A method for authenticating authorization equipment operating in a communication system having a cordless base station coupled to a telephone network, said cordless base station having an identification code associated therewith, the method comprising the steps of:
-
transmitting an authentication request from said cordless base station to said authorization equipment, said authentication request including a random number generated at said cordless base station and a first identification number; generating a first authentication result at said cordless base station, said first authentication result being based upon said random number and said first identification number; receiving at said cordless base station a second authentication result generated at said authorization equipment based upon said random number and said cordless base station identification code; and comparing said first authentication result and said second authentication result to authenticate said authentication equipment.
-
-
17. A method for validating a wired communication link between a base station and a second device connected in a telecommunication network, the method comprising the steps of:
-
(a) transmitting a first authentication request signal from said second device to said base station, said first authentication request signal having a first random number; (b) transmitting a second authentication request signal from said base station to said second device, said second authentication request signal including a second random number and a first authentication result generated within said base station based upon said first random number; (c) authenticating said base station by comparing said first authentication result to a second authentication result generated within said second device based upon said first random number; (d) transmitting a third authentication result from said second device to said base station, said third authentication result generated within said second device based upon said second random number; and (e) authenticating said second device by comparing said third authentication result to a fourth authentication result generated within said base station based upon said second random number.
-
Specification