Arranging data ciphering in a wireless telecommunication system
First Claim
1. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
- instructions to calculate, at a wireless terminal, a first ciphering key using a secret key stored in a subscriber identity module of the wireless terminal and a challenge code associated with the secret key and sent by a mobile network and transferred via a wireless local area network to the wireless terminal;
instructions to calculate, in the wireless terminal, a second ciphering key using the first ciphering key;
instructions to transmit, from the wireless terminal, an authentication request message to the mobile network, wherein the authentication request message includes the second ciphering key; and
instructions to, in response to successful authentication of the wireless terminal, decipher, in the wireless terminal, the data between the wireless terminal and an access point of the wireless local area network using the second ciphering key,wherein the subscriber identity module is configured to support a GSM system, the wireless local area network is configured to support an IEEE 802.11 standard, and the mobile network is configured to support the GSM standard.
2 Assignments
0 Petitions
Accused Products
Abstract
Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.
-
Citations
16 Claims
-
1. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
-
instructions to calculate, at a wireless terminal, a first ciphering key using a secret key stored in a subscriber identity module of the wireless terminal and a challenge code associated with the secret key and sent by a mobile network and transferred via a wireless local area network to the wireless terminal; instructions to calculate, in the wireless terminal, a second ciphering key using the first ciphering key; instructions to transmit, from the wireless terminal, an authentication request message to the mobile network, wherein the authentication request message includes the second ciphering key; and instructions to, in response to successful authentication of the wireless terminal, decipher, in the wireless terminal, the data between the wireless terminal and an access point of the wireless local area network using the second ciphering key, wherein the subscriber identity module is configured to support a GSM system, the wireless local area network is configured to support an IEEE 802.11 standard, and the mobile network is configured to support the GSM standard. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
-
instructions to encipher and decipher, at an access point, data between a wireless terminal and the access point; instructions to receive, at the access point, a terminal-specific second ciphering key from a public land mobile network, wherein the terminal-specific second ciphering key is calculated by the public land mobile network according to information received from the wireless terminal, and wherein the terminal-specific second ciphering key is received in response to a successful authentication of the wireless terminal by the public land mobile network; instructions to encipher, at the access point, data sent and decipher data received using the terminal-specific second ciphering key; and instructions to calculate, at the access point, the terminal-specific second ciphering key using a first ciphering key calculated in the public land mobile network using a secret key specific for the wireless terminal and a challenge code selected for the first ciphering key, wherein the wireless terminal comprises a subscriber identity module (SIM) configured to support a GSM system, the wireless local area network is configured to support an IEEE 802.11 standard, and the public land mobile network is configured to support a GSM standard. - View Dependent Claims (6)
-
-
7. A method comprising:
-
calculating, at a wireless terminal, a first ciphering key using a secret key stored in a subscriber identity module of the wireless terminal and a challenge code associated with the secret key and sent by a mobile network and transferred via a wireless local area network to the wireless terminal; calculating, in the wireless terminal, a second ciphering key using the first ciphering key; transmitting, from the wireless terminal, an authentication request message to the mobile network, wherein the authentication request message includes the second ciphering key; and in response to successful authentication of the wireless terminal, deciphering, in the wireless terminal, the data between the wireless terminal and an access point of the wireless local area network using the second ciphering key, wherein the subscriber identity module is configured to support a GSM system, the wireless local area network is configured to support an IEEE 802.11 standard, and the mobile network is configured to support the GSM standard. - View Dependent Claims (8, 9, 10)
-
-
11. A method comprising:
-
enciphering and deciphering, at an access point, data between a wireless terminal and the access point; receiving, at the access point, a terminal-specific second ciphering key from a public land mobile network, wherein the terminal-specific second ciphering key is calculated by the public land mobile network according to information received from the wireless terminal, and wherein the terminal-specific second ciphering key is received in response to a successful authentication of the wireless terminal by the public land mobile network; enciphering, at the access point, data sent and deciphering data received using the terminal-specific second ciphering key; and calculating, at the access point, the terminal-specific second ciphering key using a first ciphering key calculated in the public land mobile network using a secret key specific for the wireless terminal and a challenge code selected for the first ciphering key, wherein the wireless terminal comprises a subscriber identity module (SIM) configured to support a GSM system, the wireless local area network is configured to support an IEEE 802.11 standard, and the public land mobile network is configured to support a GSM standard. - View Dependent Claims (12, 13)
-
-
14. A method comprising:
-
receiving, at a public land mobile network, an authentication request from a wireless terminal; in response to receiving the authentication request, generating, at the public land mobile network, a first ciphering key and a challenge code; transmitting, from the public land mobile network, an acknowledgement message including the challenge code; receiving, at the public land mobile network, an authentication response message from the wireless terminal, wherein the authentication response message includes a check response and a protection code from the wireless terminal; verifying, at the public land mobile network, the check response; in response to a successful verification of the check response, calculating, at the public land mobile network, a second ciphering key using the first ciphering key; and transmitting the second ciphering key from the public land mobile network to an access point for enciphering and deciphering of data transmitted between the access point and the wireless terminal. - View Dependent Claims (15, 16)
-
Specification