System and method for securing a personalized indicium assigned to a mobile communications device
First Claim
Patent Images
1. A method for securing a Personal Information Number (PIN) that is mapped to at least one identifier associated with a mobile communications device, the method comprising:
- detecting, at a network node that comprises a data structure mapping said PIN to an address associated with said mobile communications device, that said address has changed;
responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and
based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device.
4 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
-
Citations
29 Claims
-
1. A method for securing a Personal Information Number (PIN) that is mapped to at least one identifier associated with a mobile communications device, the method comprising:
-
detecting, at a network node that comprises a data structure mapping said PIN to an address associated with said mobile communications device, that said address has changed; responsive to said detecting, issuing a challenge message to said mobile communications device by said network node, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and based on said challenge response from said mobile communications device, determining at said network node whether said PIN is legitimately bound to said mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A network node for securing a personalized indicium assigned to a mobile communications device (MCD), comprising:
-
a component that is configured to register said MCD with a network, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said MCD; a component that is configured to maintain a mapping between said PIN assigned to said MCD and an address associated with said MCD; a component that is configured to detect that said address mapped to said PIN has changed; a component that is configured to issue a challenge message to said MCD responsive to said detection, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and a component that is configured to determine whether said PIN is legitimately bound to said MCD based on said challenge response from said mobile communications device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer readable storage medium containing instructions executed by a processor of a network node for securing a personalized indicium assigned to a mobile communications device (MCD), said computer readable medium comprising:
-
instructions that register said MCD with a network operable with said network node, wherein said mobile communications device'"'"'s personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with said MCD; instructions that maintain a mapping between said PIN and an address associated with said MCD; instructions that detect that said address has changed; instructions that issue a challenge message to said MCD responsive to said detection, wherein a challenge response is operable to be generated by said mobile communications device using an authentication key; and instructions that determine whether said PIN is legitimately bound to said MCD based on said challenge response from said mobile communications device. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification