Authenticating mobile network provider equipment
First Claim
1. A method of providing mobile network security, comprising:
- registering a first mobile network provider equipment using a secret data that is known to a registration entity with which the first mobile network provider equipment is configured to register and embodied in a physical device associated with the first mobile network provider equipment in a manner that enables the physical device to be used to perform a cryptographic function using the secret data but prevents the physical device from being used to provide the secret data as output; and
receiving from the registration entity an encryption data usable to communicate securely with a second mobile network provider equipment over a packet data network.
7 Assignments
0 Petitions
Accused Products
Abstract
Providing mobile network security is disclosed. A first mobile network provider equipment registers using a secret data that is known to a registration entity with which the first mobile network provider equipment is configured to register and embodied in a physical device associated with the first mobile network provider equipment in a manner that enables the physical device to be used to perform a cryptographic function using the secret data but prevents the physical device from being used to provide the secret data as output. An encryption data usable to communicate securely with a second mobile network provider equipment over a packet data network is received from the registration entity.
-
Citations
31 Claims
-
1. A method of providing mobile network security, comprising:
-
registering a first mobile network provider equipment using a secret data that is known to a registration entity with which the first mobile network provider equipment is configured to register and embodied in a physical device associated with the first mobile network provider equipment in a manner that enables the physical device to be used to perform a cryptographic function using the secret data but prevents the physical device from being used to provide the secret data as output; and receiving from the registration entity an encryption data usable to communicate securely with a second mobile network provider equipment over a packet data network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for providing mobile network security, comprising:
-
a physical device in which a secret data is embodied in a manner enables the physical device to be used to perform a cryptographic function using the secret data but prevents the physical device from being used to provide the secret data as output; a processor configured to use the physical device to register the system with a registration entity to which the secret data is known, including by using the secret data to perform the cryptographic function; and a communication interface configured to receive from the registration entity an encryption data usable to communicate securely with a mobile network provider equipment over a packet data network. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A computer program product for providing mobile network security, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
registering a first mobile network provider equipment using a secret data that is known to a registration entity with which the first mobile network provider equipment is configured to register and embodied in a physical device associated with the first mobile network provider equipment in a manner that enables the physical device to be used to perform a cryptographic function using the secret data but prevents the physical device from being used to provide the secret data as output; and receiving from the registration entity an encryption data usable to communicate securely with a second mobile network provider equipment over a packet data network. - View Dependent Claims (28, 29, 30, 31)
-
Specification