Method of generating an authentication
First Claim
1. A method of generating an authentication for updating a mobile communications device'"'"'s location to a second communications device, the mobile communications device being registered to a proxy server, the method comprising, when performing the location update,providing a first input from the proxy server and a second input from the second communications device to a first algorithm to generate a shared secret, andusing the shared secret as the authentication when transmitting the location update to the second communications device, wherein the mobile communications device provides a device address and a cryptographic key to the second communications device, and the second communications device verifies the validity of the device address prior to providing the second input to the first algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of generating an authentication for updating a mobile communications device'"'"'s 40 location to a second communications device 60 is disclosed herein. The mobile communications device 40 is registered to a home network 30 comprising a proxy server but roams to a foreign network 40 with a different network number. The method proposes that, at the time of performing the location update, the second communications device and the proxy server each provides an input to a hash function to generate a shared secret; and using the shared secret as the authentication when the proxy server or the mobile communications device transmits the location update to the second communications device.
39 Citations
16 Claims
-
1. A method of generating an authentication for updating a mobile communications device'"'"'s location to a second communications device, the mobile communications device being registered to a proxy server, the method comprising, when performing the location update,
providing a first input from the proxy server and a second input from the second communications device to a first algorithm to generate a shared secret, and using the shared secret as the authentication when transmitting the location update to the second communications device, wherein the mobile communications device provides a device address and a cryptographic key to the second communications device, and the second communications device verifies the validity of the device address prior to providing the second input to the first algorithm.
Specification