Tokenized authentication across wireless communication networks
First Claim
1. A method for verifying an authentication status of a wireless communication device having previously been authenticated by a first authentication server associated with a first wireless communication network, the method comprising:
- receiving, at a second authentication server associated with a second wireless communication network, a copy of a token associated with the wireless communication device;
in response to receiving the copy of the token associated with the wireless communication device, transmitting, from the second authentication server to an intermediate server that is configured to communicate with the first authentication server and the second authentication server, a request for an identification of the first authentication server based on the received copy of the token, the first authentication server having previously provided the intermediate server with a correlation between the token and the identification of the first authentication server;
receiving at the second authentication server, in response to the request, the identification of the first authentication server based on the correlation that the first authentication server had provided to the intermediate server; and
responsive to receiving at the second authentication server the identification of the first authentication server, transmitting from the second authentication server to the first authentication server a request for a confirmation of an authentication status of the wireless communication device.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods for marking and verifying an authentication status of a wireless communication device are disclosed. When a wireless communication device is authenticated in a first wireless communication network, copies of a token, are stored in memory accessible by the wireless communication device and in memory accessible by a clearinghouse server. The clearinghouse server also stores a correlation between the token and the identity of the server that authenticated the wireless communication device. When the wireless communication device moves from the first network to a second network, the WCD transmits the token to a server in the second network, which can then query the clearinghouse server to determine the identity of the server that authenticated the WCD in the first network, confirm the authentication status of the wireless communication device, and allow the WCD to access a resource in or via the second network.
25 Citations
11 Claims
-
1. A method for verifying an authentication status of a wireless communication device having previously been authenticated by a first authentication server associated with a first wireless communication network, the method comprising:
-
receiving, at a second authentication server associated with a second wireless communication network, a copy of a token associated with the wireless communication device; in response to receiving the copy of the token associated with the wireless communication device, transmitting, from the second authentication server to an intermediate server that is configured to communicate with the first authentication server and the second authentication server, a request for an identification of the first authentication server based on the received copy of the token, the first authentication server having previously provided the intermediate server with a correlation between the token and the identification of the first authentication server; receiving at the second authentication server, in response to the request, the identification of the first authentication server based on the correlation that the first authentication server had provided to the intermediate server; and responsive to receiving at the second authentication server the identification of the first authentication server, transmitting from the second authentication server to the first authentication server a request for a confirmation of an authentication status of the wireless communication device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for verifying an authentication status of a wireless communication device having previously been authenticated by a first authentication server associated with a first wireless communication network, the method comprising:
-
at an intermediate server configured to communicate with the first authentication server associated and a second authentication server associated with a second wireless communication network, receiving from the first authentication server a token associated with the wireless communication device and an identification of the first authentication server; in response to receiving the token associated with the wireless communication device and the identification of the first authentication server, the intermediate server storing in memory a correlation between the token and the identification of the first authentication server; at the intermediate server, after storing the correlation, receiving from the second authentication server a request comprising a copy of the token; and in response to receiving from the second authentication server the request comprising the copy of the token, (i) the intermediate server using the stored correlation to determine, based on the received copy of the token, the identification of the first authentication server, and (ii) transmitting from the intermediate server to the second authentication server the determined identification of the first authentication server, to enable the second authentication server to query the identified first server to determine an authentication status of the wireless communication device. - View Dependent Claims (8, 9, 10, 11)
-
Specification