Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
First Claim
Patent Images
1. A method comprising:
- Determining, at a device, a private key for a first network based on at least one security value associated with a second network, wherein the private key refers to a key that, once calculated, is not shared with another device, wherein the second network is a cellular network and the first network is a wireless local area network, and wherein determining the private key comprises determining the private key based on a shared secret data key associated with the cellular network; and
establishing a plurality of sessions between a mobile terminal and the first network using the private key, wherein determining the private key based on the shared secret data key comprises applying a root key, an electronic serial number associated with the mobile terminal, and a network-supplied random value to a Cellular Authentication and Voice Encryption (CAVE) algorithm to generate the private key.
4 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for determining a private key for a first network based on at least one security value associated with a second network. The method further includes establishing a plurality of sessions between a mobile terminal and the first network based on the private key.
-
Citations
21 Claims
-
1. A method comprising:
Determining, at a device, a private key for a first network based on at least one security value associated with a second network, wherein the private key refers to a key that, once calculated, is not shared with another device, wherein the second network is a cellular network and the first network is a wireless local area network, and wherein determining the private key comprises determining the private key based on a shared secret data key associated with the cellular network; and
establishing a plurality of sessions between a mobile terminal and the first network using the private key, wherein determining the private key based on the shared secret data key comprises applying a root key, an electronic serial number associated with the mobile terminal, and a network-supplied random value to a Cellular Authentication and Voice Encryption (CAVE) algorithm to generate the private key.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method comprising:
Receiving, at a device, at least one security value associated with a cellular network;
determining, at the device, a private key for a wireless local area network based on the security value associated with the cellular network, wherein the private key refers to a key that, once calculated, is not shared with another device, and wherein determining the private key comprises determining the private key based on a shared secret data key associated with the cellular network, wherein determining the private key based on the shared secret data key comprises applying a root key, an electronic serial number associated with the mobile terminal, and a network-supplied random value to a Cellular Authentication and Voice Encryption (CAVE) algorithm to generate the private key; and
allowing establishment of a plurality of sessions between a mobile terminal and the wireless local area network using the private key.- View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A method comprising:
Receiving, at a server that is associated with a wireless local area network, at least one security value associated with a cellular network;
determining, using the server, a private key based on the at least one security value;
determining, at a mobile terminal, a private key based on the at least one security value associated with the cellular network, wherein the private key refers to a key that, once calculated, is not shared with another device, wherein determining the private key comprises determining the private key based on a shared secret data key associated with the cellular network, wherein determining the private key based on the shared secret data key comprises applying a root key, an electronic serial number associated with the mobile terminal, and a network-supplied random value to a Cellular Authentication and Voice Encryption (CAVE) algorithm to generate the private key; and
allowing establishment of a plurality of sessions between a mobile terminal and the wireless local area network using the private key determining by the mobile terminal.- View Dependent Claims (18, 19, 20, 21)
Specification