Dynamic security authentication for wireless communication networks
DCFirst Claim
1. A method of providing secure authentication between wireless communication network nodes, the method comprising:
- providing a node identifier comprising an address and an initial authentication key;
installing the node identifier at a first network node;
storing the node identifier at a second network node;
sending node identifier information from a first network node to a second network node; and
synchronously regenerating an authentication key at two network nodes based upon node identifier information.
4 Assignments
Litigations
0 Petitions
Accused Products
Abstract
In a first embodiment, a dynamic computer system security method and system using dynamic encryption and full synchronization between system nodes. A data record created by a source user is encrypted with an initial dynamic session key. A new dynamic session key is generated based upon a data record and a previous dynamic session key. A central authority is used to synchronize and authenticate both source and destination users with constantly regenerated dynamic authentication keys. In a second embodiment, a method of providing dynamic security authentication between wireless communication network nodes. An initial authentication key and an address are assigned to certain of the nodes. The address along with information encrypted by the initial authentication key is sent to an authentication server. The authentication server and node or nodes synchronously regenerate authentication keys based upon the initial authentication key. Secure handovers occur between nodes via an authentication key.
46 Citations
26 Claims
-
1. A method of providing secure authentication between wireless communication network nodes, the method comprising:
-
providing a node identifier comprising an address and an initial authentication key; installing the node identifier at a first network node; storing the node identifier at a second network node; sending node identifier information from a first network node to a second network node; and synchronously regenerating an authentication key at two network nodes based upon node identifier information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A network for providing secure authentication between wireless communication network nodes, the network comprising:
-
a first network node; a node identifier comprising an address and an initial authentication key, said node identifier associated with said first network node; a second network node, said second network node comprising means for storing said node identifier; a communication channel between said first and second network nodes; and means for synchronously regenerating an authentication key at said first and second network nodes based upon said node identifier.
-
Specification