Integrity check value for WLAN pseudonym
First Claim
Patent Images
1. A method for generating a subscriber identifier, comprising the steps of:
- generating an identifier base string based on encrypting a subscriber identifying value;
generating an integrity check value based on the identifier base string; and
generating a subscriber identifier based on a concatenation of the identifier base string and an integrity check value.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention proposes a method for generating a subscriber identifier, comprising the steps of generating an identifier base string based on encrypting a subscriber identifying value, generating an integrity check value based on the identifier base string, and generating a subscriber identifier based on a concatenation of the identifier base string and the integrity check value. The invention also proposes a corresponding network control node.
135 Citations
31 Claims
-
1. A method for generating a subscriber identifier, comprising the steps of:
-
generating an identifier base string based on encrypting a subscriber identifying value;
generating an integrity check value based on the identifier base string; and
generating a subscriber identifier based on a concatenation of the identifier base string and an integrity check value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for validating a subscriber identifier, wherein the subscriber identifier comprises a format including at least integrity check values, the method comprising the steps of:
-
detecting an integrity check value of a received subscriber identifier, performing an integrity check based on the integrity check value and the subscriber identifier, and rejecting the subscriber identifier in case the integrity check reveals that the subscriber identifier is not valid. - View Dependent Claims (13)
-
-
14. A network control node for generating a subscriber identifier, the network node comprising:
-
means for generating an identifier base string based on encrypting a subscriber identifying value;
means for generating an integrity check value based on the identifier base string; and
means for generating a subscriber identifier based on a concatenation of the identifier base string and the integrity check value. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A network control node for validating a subscriber identifier, wherein the subscriber identifier comprises a format including at least integrity check values, the network control node comprising:
-
means for detecting an integrity check value of a received subscriber identifier;
means for performing an integrity check based on the integrity check value and the subscriber identifier; and
means for rejecting the subscriber identifier in case the integrity check reveals that the subscriber identifier is not valid. - View Dependent Claims (26, 27)
-
-
28. A computer program product stored on a tangible medium, the product comprising software code, when executed by one or more processors, performs the steps of:
-
generating an identifier base string based on encrypting a subscriber identifying value;
generating an integrity check value based on the identifier base string; and
generating a subscriber identifier based on a concatenation of the identifier base string and an integrity check value. - View Dependent Claims (29, 30, 31)
-
Specification