Method for repeated authentication of a user subscription identity module
First Claim
1. A method of authenticating a user identity module communicatively coupled with a mobile shell having an established security association with a server network, the method comprising:
- receiving a first message from the mobile shell;
determining a second message based upon the first message and a first key known to the server network and unknown to the mobile shell;
wherein the first key is generated during the establishment of the security association; and
providing the second message to the server network.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for improving an established Authentication and Key Agreement procedure which prevents rogue mobiles from fraudulently gaining access to a communication system. The communication system periodically broadcasts a challenge interrogation message requesting that a mobile, which is currently validated to use the system, to authenticate itself to the system. The mobile computes an authentication response based on information known only to the communication system and the USIM of the mobile and transmits said response to the communication system. The communication system also computes an authentication response and compares said response with that received from the mobile. A mobile is authenticated by the communication system when the two authentication responses are equal. Otherwise, the mobile is not given access to the communication system.
55 Citations
18 Claims
-
1. A method of authenticating a user identity module communicatively coupled with a mobile shell having an established security association with a server network, the method comprising:
-
receiving a first message from the mobile shell; determining a second message based upon the first message and a first key known to the server network and unknown to the mobile shell;
wherein the first key is generated during the establishment of the security association; andproviding the second message to the server network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of authentication by a server network having an established security association with a mobile shell communicatively coupled with a user identity module, the method comprising:
-
establishing a security association with the mobile shell; receiving a first message from the mobile shell; and authenticating the mobile shell based upon the first message and a first key known to the user identity module and unknown to the mobile shell; and
wherein the first key is generated during the establishment of the security association. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification