User key validation to prevent fraud during system handoffs
First Claim
1. A method for user key validation during system handoff in a wireless communication system comprising:
- generating a user key by a first satellite;
sending the user key from the first satellite to an individual subscriber unit (ISU) via a communication link, the communication link being established between the ISU and the first satellite;
handing off the communication link from the first satellite to a second satellite, the second satellite requesting transmission of the user key from the ISU;
authenticating the ISU by the second satellite by comparing the user key transmitted by the ISU with a copy of the user key stored in a memory associated with one of the first satellite and the second satellite.
3 Assignments
0 Petitions
Accused Products
Abstract
A user key validation during a handoff verifies the subscriber using the wireless communication system and prevents fraudulent use of the system. A wireless communication system (10) has a number of satellites (20, 22, 24) with which a subscriber unit (12) establishes a communication link. However, as the quality of the transmitted signal between an active satellite (22) and the subscriber unit (12) degrades, a handoff of the communication link with the subscriber unit (12) will occur if the subscriber (12) meets the authentication requirements of the system (10). The active satellite (22) generates user keys and transmits the user keys to the active subscriber units (12). A request of a handoff is made from the individual subscriber unit (ISU) (12) to the losing SV (22). The losing SV (22) communicates with the gaining SV (20) to establish a handoff. The losing SV (22) sends the user key of the ISU (12) to the gaining SV (20). The gaining SV (20) authenticates the ISU (12) by comparing the ISU user key to a user key stored in the losing SV (22). The gaining SV (20) becomes the active satellite, and generates and transmits the user key to the ISU. Notification of the authentication is sent to an earth terminal controller (30). The earth terminal controller (30) provides the losing SV (22) with notification that the handoff is complete. The authentication a prevents further fraud if the subscriber fraudulently obtained access to the system during the original call set up.
15 Citations
15 Claims
-
1. A method for user key validation during system handoff in a wireless communication system comprising:
-
generating a user key by a first satellite;
sending the user key from the first satellite to an individual subscriber unit (ISU) via a communication link, the communication link being established between the ISU and the first satellite;
handing off the communication link from the first satellite to a second satellite, the second satellite requesting transmission of the user key from the ISU;
authenticating the ISU by the second satellite by comparing the user key transmitted by the ISU with a copy of the user key stored in a memory associated with one of the first satellite and the second satellite. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for user key validation during system handoffs in a wireless communication system comprising:
-
establishing a traffic channel between an individual subscriber (ISU) and a losing satellite (losing SV);
generating a user key by the losing SV;
sending the user key from the losing SV to the ISU via the traffic channel;
requesting a handoff from the losing SV to a gaining satellite (gaining SV);
transmitting a handoff signal from the losing SV to the ISU;
requesting transmission of an ISU user key from the ISU to the gaining SV;
authenticating the ISU by comparing the ISU user key to a user key stored in the losing SV;
establishing a traffic channel between the gaining SV and the ISU, the gaining SV generating an updated user key;
transmitting the updated user key from the gaining SV to the ISU;
sending a notification of the authentication to an earth terminal controller, the earth terminal controller providing the losing SV with notification that the handoff is complete; and
removing the temporary connection between the losing SV and the gaining SV. - View Dependent Claims (9, 10, 11, 12)
requesting a pathend channel from a gaining SV;
establishing a pathend channel between the gaining SV and the losing SV; and
establishing a temporary connection between the losing SV and the gaining SV;
after the step of requesting a handoff from the losing SV.
-
-
10. The method of claim 9 wherein the step of requesting of a pathend channel further includes the transmission of the ISU user key stored in the losing SV to the gaining SV.
-
11. The method of claim 10 further including the step of removing the temporary connection between the losing SV and the gaining SV after the ISU user key is transmitted from the losing SV to the gaining SV.
-
12. The method of claim 8 wherein the temporary connection is a virtual connection.
-
13. An apparatus for validating a user key during a handoff in a wireless communication system comprising:
-
an individual subscriber unit (ISU) having a user key module, the user key module for receiving, storing, and transmitting the user key;
a losing satellite for communicating with the ISU, the losing satellite having a user key generator for creating user keys, and a user key memory for storing and transmitting the user key;
a gaining satellite for communicating with the ISU, the losing satellite, and a communication gateway, the gaining satellite having an authenticator module for verifying the user key sent by the losing satellite to the ISU by performing a user key comparison; and
an earth terminal controller for communicating with the ISU, the losing satellite and the gaining satellite, the earth terminal controller notifying the losing satellite of the handoff. - View Dependent Claims (14, 15)
-
Specification