×

Cellular telephone device having authenticating capability

  • US 7,809,948 B2
  • Filed: 12/29/2005
  • Issued: 10/05/2010
  • Est. Priority Date: 06/19/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A cellular telephone, comprising:

  • a transceiver for communicating with a cellular telephone service provider;

    a telephonic interface for audible communication with a user;

    an identity private key and a data descriptor stored in said cellular telephone, said data descriptor comprising attribute data of said cellular telephone, an identity public key, and a digital signature of said attribute data and said identity public key, said identity public key corresponding to said identity private key according to a first public/private key encryption algorithm, said digital signature representing an encryption of data derived from said identity public key and said attribute data, said encryption being according to a second public/private key encryption algorithm using a signature private key;

    a digital controller controlling operation of said cellular telephone, wherein said digital controller;

    (a) causes said cellular telephone to transmit said data descriptor to a cellular telephone service provider with a request for service;

    (b) responsive to a request from said cellular telephone service provider, performs a first data transformation of test data received from said cellular telephone service provider according to said first public/private key encryption algorithm using said identity private key; and

    (c) transmits the transformed test data to said cellular telephone service provider for verification as a condition of providing cellular telephone service, said transformed test data being verifiable by said cellular telephone service provider by performing a second data transformation according to said first public/private key encryption algorithm using said identity public key, said identity public key being verifiable by said cellular telephone service provider by decrypting said digital signature according to said second public/private key encryption algorithm using a signature public key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×