Authentication in a packet data network
First Claim
1. Authentication method for authenticating a mobile node to a packet data network, comprising the steps of:
- providing the mobile node with a mobile node identity and a shared secret specific to the mobile node identity and usable by a telecommunications network;
providing the mobile node with a protection code;
sending the mobile node identity and the protection code from the mobile node to the packet data network;
providing the packet data network with authentication information usable by the telecommunications network, the authentication information comprising a challenge based on RAND codes of at least two authentication triplets of the telecommunications network, and a session secret corresponding to the mobile node identity and derivable using the challenge and the shared secret;
forming cryptographic information using at least the protection code and the session secret;
sending the challenge and the cryptographic information from the packet data network to the mobile node;
checking at the mobile node the validity of the cryptographic information using the challenge and the shared secret;
generating at the mobile node the session secret and a first response corresponding to the challenge, based on the shared secret;
sending the first response to the packet data network; and
checking the first response for authenticating the mobile node.
4 Assignments
0 Petitions
Accused Products
Abstract
Authentication method for authenticating a mobile node to a packet data network, in which a shared secret for both the mobile node and the packet data network is arranged by using a shared secret of the mobile node and a telecommunications network authentication center. In the method, the mobile node sends its subscriber identity to the packet data network together with a replay attack protector. The packet data network obtains authentication triplets, forms a session key using them, and sends back to the mobile node challenges and a cryptographic authenticator made by using the session key. The mobile node can then form the rest of the authentication triplets using the challenges and then form the session key. With the session key, the mobile node can check the validity of the cryptographic authenticator. If the authenticator is correct, the mobile node sends a cryptographic response formed using the session key to the packet data network for authenticating itself to the packet data network.
-
Citations
15 Claims
-
1. Authentication method for authenticating a mobile node to a packet data network, comprising the steps of:
-
providing the mobile node with a mobile node identity and a shared secret specific to the mobile node identity and usable by a telecommunications network; providing the mobile node with a protection code; sending the mobile node identity and the protection code from the mobile node to the packet data network; providing the packet data network with authentication information usable by the telecommunications network, the authentication information comprising a challenge based on RAND codes of at least two authentication triplets of the telecommunications network, and a session secret corresponding to the mobile node identity and derivable using the challenge and the shared secret; forming cryptographic information using at least the protection code and the session secret; sending the challenge and the cryptographic information from the packet data network to the mobile node; checking at the mobile node the validity of the cryptographic information using the challenge and the shared secret; generating at the mobile node the session secret and a first response corresponding to the challenge, based on the shared secret; sending the first response to the packet data network; and
checking the first response for authenticating the mobile node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network entity for acting as an interface between a packet data network and a telecommunications network having an access to an authentication server, the network entity comprising:
-
an input for receiving a mobile node identity and a protection code from the packet data network; an output for providing the authentication server with the mobile node identity; an Input for receiving a challenge and a session secret corresponding to the mobile node identity from the authentication server; a first processor for forming cryptographic information using at least the protection code and the session secret; an output for providing the packet data network with the challenge and the cryptographic information for further transmission to a mobile node; an input for receiving a first response corresponding to the challenge, based on a shared secret spedflc to the subscriber identity and known by the mobile node and the telecommunications network, from the mobile node via the packet data network; and a second processor for verifying the first response for authenticating the mobile node, and wherein the network entity is configured to receive at least two challenges corresponding to the mobile node identity from the authentication server, to form the cryptographic information based on the at least two received challenges and to output the at least two received challenges and the cryptographic information for further transmission to the mobile node. - View Dependent Claims (13, 14, 15)
-
Specification