Identification of a terminal with a server
First Claim
1. A process to identify a user terminal resource or a user of the terminal resource by a server resource in a telecommunication network, using a first identifier, where an asymmetrical algorithm with public key is implemented in the terminal resource, comprising the following steps:
- generating a random number in the user terminal resource, determining in the terminal resource a second identifier as a function of the random number, at least from part of the first identifier and from the result of executing the asymmetrical algorithm to which at least the random number is applied, transmitting the second identifier to the server resource, and in the server resource, retrieving the first identifier at least by executing the asymmetrical algorithm to which a private key and, at least partially, the second identifier are applied, so that the server resource verifies that the first retrieved identifier is written into a memory of the server resource.
0 Assignments
0 Petitions
Accused Products
Abstract
A chip card in a terminal such as a mobile radiotelephone is identified by a first identifier with a server including for example the nominal locating recorder in a cellular radiotelephone network, without the first identifier being transmitted in a clear form or substituted by a provisional identifier. An anonymous identifier is determined in the card on the basis of a generated random number, the first identifier and the result of a public key asymmetric algorithm to which at least the random number is applied. The anonymous identifier is transmitted to the server which recovers the first identifier at least by executing the asymmetric algorithm to which a private key and at least partly the anonymous identifier are applied.
48 Citations
9 Claims
-
1. A process to identify a user terminal resource or a user of the terminal resource by a server resource in a telecommunication network, using a first identifier, where an asymmetrical algorithm with public key is implemented in the terminal resource, comprising the following steps:
-
generating a random number in the user terminal resource, determining in the terminal resource a second identifier as a function of the random number, at least from part of the first identifier and from the result of executing the asymmetrical algorithm to which at least the random number is applied, transmitting the second identifier to the server resource, and in the server resource, retrieving the first identifier at least by executing the asymmetrical algorithm to which a private key and, at least partially, the second identifier are applied, so that the server resource verifies that the first retrieved identifier is written into a memory of the server resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A user terminal resource identifying itself, or identifying a user of the latter, to a server resource, through a telecommunication network, using a first identifier, an asymmetrical algorithm with a public key implemented in the terminal resource, comprising:
-
a resource to generate a random number, and a resource to determine a second identifier as a function of the random number, at least from part of the first identifier and from the result of executing the asymmetrical algorithm to which at least the random number is applied in order to transmit the second identifier to the server resource, which retrieves the first identifier at least by executing the asymmetrical algorithm to which a private key and, at least partially, the second identifier are applied, and which verifies that the first retrieved identifier is written into a memory of the server resource. - View Dependent Claims (9)
-
Specification