×

Method and software program product for mutual authentication in a communications network

  • US 7,231,203 B2
  • Filed: 03/05/2004
  • Issued: 06/12/2007
  • Est. Priority Date: 03/06/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for a mutual authentication between a user and a communications network, said user being provided with a terminal to which a subscriber identity module is operatively coupled, said subscriber identity module storing at least one identifier and a first copy of a unique key associated to said user, said network including an authentication sub-system comprising at least a first authentication apparatus storing a second copy of said unique key associated to said user identifier, comprising:

  • sending said user identifier from said subscriber identity module to said terminal;

    generating, a first number at said terminal;

    sending said identifier and at least a portion of said first number from said terminal to said authentication sub-system through an access point of said network;

    at said authentication sub-system, identifying said second copy of said unique key using said identifier, generating at least a second number and challenging said second number with said second copy of said unique key, so as to generate at least a first session key and at least a first signed response;

    at said authentication sub-system, forming, according to a first rule, a second session key using at least said first session key, and encrypting at least said first number portion using said second session key;

    sending at least said encrypted first number portion and said second number from said authentication sub-system to said terminal;

    forwarding said second number from said terminal to said subscriber identity module and challenging, at said subscriber identity module said second number with said first copy of said unique key, so as to generate at least a third session key and at least a second signed response;

    sending said third session key and said second signed response from said subscriber identity module to said terminal;

    at said terminal, forming a fourth session key, according to a second rule corresponding to said first rule, using at least said third session key, and decrypting said first number portion received from said authentication sub-system using said fourth session key;

    checking, at said terminal, a matching between said decrypted first number portion with a corresponding portion of said generated first number, so as to allow communications from said network to said terminal;

    sending at least said second signed response from said terminal to said authentication sub-system; and

    at said authentication sub-system, checking a matching between said first signed response and said second signed response, so as to allow communications from said terminal to said network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×