×

Enhanced subscriber authentication protocol

  • US 7,123,721 B2
  • Filed: 06/04/2001
  • Issued: 10/17/2006
  • Est. Priority Date: 12/04/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of establishing communication between a first correspondent and a second correspondent, each of said correspondents having a respective identity, said first correspondent having a private key and a public key derived therefrom, said method comprising the steps of:

  • a) said second correspondent obtaining said public key of said first correspondent;

    b) said second correspondent sending a short-lived public key and said second correspondent'"'"'s identity to said first correspondent;

    c) said first correspondent combining its private key with said short-lived public key and generating a pair of secret keys therefrom;

    d) said first correspondent using a first of said pair of secret keys to compute a first MAC on its identity, said second correspondent'"'"'s identity, a random challenge, and said short-lived public key;

    e) said first correspondent sending its identity, said random challenge, and said first MAC to said second correspondent, thereby requesting registration;

    f) said second correspondent using a short-lived private key corresponding to said short-lived public key and said first correspondent'"'"'s public key to generate said pair of secret keys;

    g) said second correspondent using said first of said pair of secret keys to compute a second MAC on its identity, said first correspondent'"'"'s identity, said random challenge, and said short-lived public key;

    h) said second correspondent verifying said first MAC using said first of said pair of secret keys;

    i) said second correspondent sending said second MAC to said first correspondent, thereby registering said first correspondent;

    j) said first correspondent verifying said second MAC using said first of said pair of secret keys;

    k) said correspondents each computing a pair of session keys from a second of said pair of secret keys, said short-lived public key, and said random challenge; and

    l) said correspondents using at least one of said session keys in a secure communication.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×