Authenticating an application
First Claim
1. A method of authenticating an application, the method comprising:
- performing, with a server application, bootstrapping procedures between the server application and a bootstrapping server function server;
deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier;
providing the application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures;
receiving a response from the application; and
authenticating the application by validating the response with the shared key.
2 Assignments
0 Petitions
Accused Products
Abstract
One aspect of the invention discloses a method of authenticating an application. The method comprising performing, with a server application, bootstrapping procedures between the server application and a bootstrapping server function; deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier; providing an application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures; receiving a response from the application; and authenticating the application by validating the response with the shared key.
87 Citations
52 Claims
-
1. A method of authenticating an application, the method comprising:
-
performing, with a server application, bootstrapping procedures between the server application and a bootstrapping server function server; deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier; providing the application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures; receiving a response from the application; and authenticating the application by validating the response with the shared key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating an application with a server application, the method comprising:
-
receiving, with the application, from the server application at least a bootstrapping transaction identifier; opening a communication link with a network application function server; providing the network application function server with at least the bootstrapping transaction identifier via the communication link; receiving, in response to providing the bootstrapping transaction identifier, at least a response from the network application function server; and authenticating the application by providing the server application with at least the response received from the network application function server. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of deriving an authentication key, the method comprising:
-
opening a communication link with an application; receiving, from the application, at least a bootstrapping transaction identifier via the communication link; sending a request to a bootstrapping server function server to receive a shared key, the request comprising at least the bootstrapping transaction identifier; receiving, from the bootstrapping transaction identifier, the shared key in response to the request; deriving a response by using at least the shared key; and sending at least the response to the application. - View Dependent Claims (18, 19)
-
-
20. A computer program embodied on a data-processing device to authenticate an application, the computer program comprising code configured to comprise:
-
performing bootstrapping procedures with a bootstrapping server function server; deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier; providing the application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures; receiving a response from the application; and authenticating the application by validating the response with the shared key. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer program embodied on a data-processing device to authenticate an application with a server application, the computer program comprising code configured to comprise:
-
receiving from a server application at least a bootstrapping transaction identifier; opening a communication link with a network application function server; providing the network application function server with at least the bootstrapping transaction identifier via the communication link; receiving, in response to providing the bootstrapping transaction identifier, at least a response from the network application function server; and authenticating the application by providing the server application with at least the response received from the network application function server. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. A computer program embodied on a data-processing device to derive an authentication key, the computer program comprising code configured to comprise:
-
opening a communication link with an application; receiving, from the application, at least a bootstrapping transaction identifier via the communication link; sending a request to a bootstrapping server function server to receive a shared key, the request comprising at least the bootstrapping transaction identifier; receiving, from the bootstrapping transaction identifier, the shared key in response to the request; deriving a response by using at least the shared key; and sending at least the response to the application. - View Dependent Claims (39, 40, 41)
-
-
42. A mobile terminal for authenticating an application, comprising:
a server application configured to perform bootstrapping procedures between the server application and a bootstrapping server function server, to derive a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier, to provide the application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures, to receive a response from the application, and to authenticate the application by validating the response with the shared key. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
Specification