Method and apparatus for providing bootstrapping procedures in a communication network
First Claim
1. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus embedded in a network element to at least perform the following steps:
- receiving from a user device a message requesting authentication for accessing information by the user device over a data network, wherein the message specifies a user identity associated with the user device, the user identity is generated based on a secret data and a random secret data generated at the user device, and the message is generated according to a hypertext transfer protocol;
forwarding the user identity to a location register configured to verify, based on the user identity, cryptographic parameters including the random secret data and to generate the secret data, from the random secret data according to a cryptographic algorithm;
receiving the secret data at the network element from the location register;
generating an authentication vector by converting the secret data to key parameters that include an authenticating token and an authentication response;
transmitting the authenticating token from the network element to the user device that is configured to output an authentication response based on the authenticating token;
validating the authentication response received from the user device using the authentication response of the authentication vector;
after the authentication response received from the user device is validated, generating a master key based on the key parameters; and
authenticating one or more messages from the user device using the master key,wherein the secret data is shared between the network element and the user device to generate the master key for the network element and another master key for the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for performing authentication in a communication system. In one embodiment, a key is established with a terminal in a communication network according to a key agreement protocol. The agreed key is tied to an authentication procedure to provide a security association that supports reuse of the key. A master key is generated based on the agreed key. In another embodiment, digest authentication is combined with key exchange parameters (e.g., Diffie-Hellman parameters) in the payload of the digest message, in which a key (e.g., SMEKEY or MN-AAA) is utilized as a password. In yet another embodiment, an authentication algorithm (e.g., Cellular Authentication and Voice Encryption (CAVE)) is employed with a key agreement protocol with conversion functions to support bootstrapping.
16 Citations
18 Claims
-
1. A non-transitory computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus embedded in a network element to at least perform the following steps:
-
receiving from a user device a message requesting authentication for accessing information by the user device over a data network, wherein the message specifies a user identity associated with the user device, the user identity is generated based on a secret data and a random secret data generated at the user device, and the message is generated according to a hypertext transfer protocol; forwarding the user identity to a location register configured to verify, based on the user identity, cryptographic parameters including the random secret data and to generate the secret data, from the random secret data according to a cryptographic algorithm; receiving the secret data at the network element from the location register; generating an authentication vector by converting the secret data to key parameters that include an authenticating token and an authentication response; transmitting the authenticating token from the network element to the user device that is configured to output an authentication response based on the authenticating token; validating the authentication response received from the user device using the authentication response of the authentication vector; after the authentication response received from the user device is validated, generating a master key based on the key parameters; and authenticating one or more messages from the user device using the master key, wherein the secret data is shared between the network element and the user device to generate the master key for the network element and another master key for the user device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a network element from a user device, a message requesting authentication for accessing information by the user device over a data network, wherein the message specifies a user identity associated with the user device, the user identity is generated based on a secret data and a random secret data generated at the user device, and the message is generated according to a hypertext transfer protocol; forwarding the user identity from the network element to a location register configured to verify, based on the user identity, cryptographic parameters including the random secret data and to generate the secret data from the random secret data according to a cryptographic algorithm; receiving the secret data at the network element from the location register; generating, by the network element, an authentication vector by converting the secret data to key parameters that include an authenticating token and an authentication response; transmitting the authenticating token from the network element to the user device that is configured to output an authentication response based on the authenticating token; validating, by the network element, the authentication response received from the user device using the authentication response of the authentication vector; after the authentication response received from the user device is validated, generating, by the network element, a master key based on the key parameters; and authenticating, by the network element, one or more messages from the user device using the master key, wherein the secret data is shared between the network element and the user device to generate the master key for the network element and another master key for the user device. - View Dependent Claims (8, 9, 10, 11, 12, 14, 15, 16, 17, 18)
-
-
13. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus embedded in a network element to perform at least the following, receive from a user device a message requesting authentication for accessing information by the user device over a data network, wherein the message specifies a user identity associated with the user device, the user identity is generated based on a secret data and a random secret data generated at the user device, and the message is generated according to a hypertext transfer protocol; forward the user identity to a location register configured to verify, based on the user identity, cryptographic parameters including the random secret data and to generate the secret data from the random secret data according to a cryptographic algorithm; receive the secret data at the network element from the location register; generate an authentication vector by converting the secret data to key parameters that include an authenticating token and an authentication response; transmit the authenticating token from the network element to the user device that is configured to output an authentication response based on the authenticating token; validate the authentication response received from the user device using the authentication response of the authentication vector; after the authentication response received from the user device is validated, generate a master key based on the key parameters; and authenticate one or more messages from the user device using the master key, wherein the secret data is shared between the network element and the user device to generate the master key for the network element and another master key for the user device.
-
Specification