Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization
First Claim
Patent Images
1. A method for generating a temporary pseudonym identity associated with a subscriber, comprising:
- generating a master pseudonym identity associated with the subscriber, wherein the master pseudonym identity is derived from a source other than a subscriber'"'"'s permanent identity;
generating a ps_mk by applying a pseudo-random number function to a server-key, wherein a timestamp is associated with the server key;
partitioning a ps_mk into a plurality of portions including at least a ps_ck portion and a ps_ik portion;
generating a ps_payload by applying a two-way encryption function to the master pseudonym identity and the ps_ck;
generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; and
generating a temporary pseudonym identity by concatenating the ps_mac, the timestamp, and the ps_payload.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for improved authentication of subscribers wishing to connect to a wireless network using the EAP-AKA protocol. Embodiments exploit the requirement that the client store and transmit the Pseudonym and Fast Re-authentication Identities upon request. By using the Fast Re-authentication Identity to store session state key information, the need for the AAA server to store and replicate the EAP-AKA key information for every session is eliminated.
-
Citations
16 Claims
-
1. A method for generating a temporary pseudonym identity associated with a subscriber, comprising:
-
generating a master pseudonym identity associated with the subscriber, wherein the master pseudonym identity is derived from a source other than a subscriber'"'"'s permanent identity; generating a ps_mk by applying a pseudo-random number function to a server-key, wherein a timestamp is associated with the server key; partitioning a ps_mk into a plurality of portions including at least a ps_ck portion and a ps_ik portion; generating a ps_payload by applying a two-way encryption function to the master pseudonym identity and the ps_ck; generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; and generating a temporary pseudonym identity by concatenating the ps_mac, the timestamp, and the ps_payload. - View Dependent Claims (2, 3, 4)
-
-
5. A method for generating a fast re-authentication identity storing session state key information for use in an EAP-AKA fast re-authentication, comprising:
-
generating a first digital value by applying a first hashing function to a concatenation of a server-key and a subscriber password, wherein a timestamp is associated with the server key; generating an inner_mk by applying a first pseudo-random number function to the first digital value; generating an inner_ck by extracting a first 128 bits of inner_mk; generating an inner_payload by applying a first two-way encryption function to the inner_ck and a concatenation of a master key and a counter; generating an outer_mk by applying a second pseudo-random number function to the server key; partitioning the outer_mk into a plurality of portions including at least an outer_ck portion and an outer_ik portion; generating an outer_payload by applying a second two-way encryption function to the outer_ck and a concatenation of the inner_payload and a Master Pseudo Id; generating an outer_mac by applying a second hashing function to a concatenation of the outer_payload and the outer_ik; and generating a fast re-authentication identity storing session state key information by concatenating the outer_mac, the timestamp, and the outer_payload. - View Dependent Claims (6, 7, 8)
-
-
9. A method for validating a pseudonym identity associated with a subscriber, comprising:
-
receiving a pseudonym identity associated with the subscriber, wherein the master pseudonym identity is derived from a source other than a subscriber'"'"'s permanent identity; extracting a timestamp, a ps_payload and a rcvd_mac from the received pseudonym identity; determining a server key using a look-up table and the timestamp; generating a ps_mk by applying a pseudo-random number function to the server-key; partitioning the ps_mk into a plurality of portions including at least a ps_ck portion and a ps_ik portion; generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; comparing the ps_mac and the rcvd_mac; and if comparing reveals a match, determining a Master-Pseudo-Id by applying a decryption function to the ps_payload and the ps_ck. - View Dependent Claims (10, 11, 12)
-
-
13. A method for validating a fast re-authentication identity storing session state key information for a subscriber for use in an EAP-AKA fast re-authentication, comprising:
-
receiving a fast re-authentication identity storing session state key information associated with the subscriber; extracting a timestamp, an outer_payload and a rcvd_mac from the received fast re-authentication identity; determining a server key using a look-up table and the timestamp; generating an outer_mk by applying a first pseudo-random number function to the server-key; partitioning the outer_mk into a plurality of portions including at least an outer_ck portion and an outer_ik portion; generating a outer_mac by applying a first hashing function to a concatenation of the outer_payload and the outer_ik; comparing the outer_mac and the rcvd_mac; and if comparing does not reveal a match, rejecting the received fast re-authentication identity and stop; if comparing does reveal a match, determining a Master-Pseudo-Id and an inner_payload by applying a first decryption function to the outer-payload using the outer_ck; retrieving a subscriber password from a subscriber database using the Master-Pseudo-Id; generating an inner_mk by applying a second pseudo-random number function to an output of applying a second hashing function to a concatenation of the server-key and the subscriber password; extracting an inner_ck, wherein the inner_ck is a first 128 bits of the inner_mk; determining a master-key (MK) from which all other key material is derived and a counter by applying a second decryption function to the inner-payload using the inner_ck; and regenerating master session key (MSK) for use in fast re-authentication using the master-key (MK) and the counter. - View Dependent Claims (14, 15, 16)
-
Specification