Extensible Authentication Protocol Authentication and Key Agreement (EAP-AKA) Optimization
First Claim
Patent Images
1. A method for generating a temporary pseudonym identity associated with a subscriber, comprising:
- receiving a master pseudonym identity associated with the subscriber;
generating a ps_mk by applying a pseudo-random number function to a server-key, wherein a timestamp is associated with the server key;
partitioning a ps_mk into at least a ps_ck and a ps_ik;
generating a ps_payload by applying a two-way encryption function to the master pseudonym identity and the ps_ck;
generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; and
generating a temporary pseudonym identity by concatenating the ps_mac, the timestamp, and the ps_payload.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for improved authentication of subscribers wishing to connect to a wireless network using the EAP-AKA protocol. Embodiments exploit the requirement that the client store and transmit the Pseudonym and Fast Re-authentication Identities upon request. By using the Fast Re-authentication Identity to store session state key information, the need for the AAA server to store and replicate the EAP-AKA key information for every session is eliminated.
143 Citations
16 Claims
-
1. A method for generating a temporary pseudonym identity associated with a subscriber, comprising:
-
receiving a master pseudonym identity associated with the subscriber; generating a ps_mk by applying a pseudo-random number function to a server-key, wherein a timestamp is associated with the server key; partitioning a ps_mk into at least a ps_ck and a ps_ik; generating a ps_payload by applying a two-way encryption function to the master pseudonym identity and the ps_ck; generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; and generating a temporary pseudonym identity by concatenating the ps_mac, the timestamp, and the ps_payload. - View Dependent Claims (2, 3, 4)
-
-
5. A method for generating a fast re-authentication identity for use in an EAP-AKA fast re-authentication, comprising:
-
generating a first digital value by applying a first hashing function to a concatenation of a server-key and a subscriber password, wherein a timestamp is associated with the server key; generating an inner_mk by applying a first pseudo-random number function to the first digital value; generating an inner_ck by extracting a first 128 bits of inner_mk; generating an inner_payload by applying a first two-way encryption function to the inner_ck and a concatenation of a master key and a counter; generating an outer_mk by applying a second pseudo-random number function to the server key; partitioning the outer_mk into at least an outer_ck and an outer_ik; generating an outer_payload by applying a second two-way encryption function to the outer_ck and a concatenation of the inner_payload and a Master Pseudo Id; generating an outer_mac by applying a second hashing function to a concatenation of the outer_payload and the outer_ik; and generating a fast re-authentication identity by concatenating the outer_mac, the timestamp, and the outer_payload. - View Dependent Claims (6, 7, 8)
-
-
9. A method for validating a pseudonym identity associated with a subscriber, comprising:
-
receiving a pseudonym identity associated with the subscriber; extracting a timestamp, a ps_payload and a rcvd_mac from the received pseudonym identity; determining a server key using a look-up table and the timestamp; generating a ps_mk by applying a pseudo-random number function to the server-key; partitioning the ps_mk into at least a ps_ck and a ps_ik; generating a ps_mac by applying a hashing function to a concatenation of the ps_payload and the ps_ik; comparing the ps_mac and the rcvd_mac; and if comparing reveals a match, determining a Master-Pseudo-Id by applying a decryption function to the ps_payload and the ps_ck. - View Dependent Claims (10, 11, 12)
-
-
13. A method for validating a fast re-authentication identity for a subscriber for use in an EAP-AKA fast re-authentication, comprising:
-
receiving a fast re-authentication identity associated with the subscriber; extracting a timestamp, an outer_payload and a rcvd_mac from the received fast re-authentication identity; determining a server key using a look-up table and the timestamp; generating an outer_mk by applying a first pseudo-random number function to the server-key; partitioning the outer_mk into at least an outer_ck and an outer_ik; generating a outer_mac by applying a first hashing function to a concatenation of the outer_payload and the outer_ik; comparing the outer_mac and the rcvd_mac; and if comparing does not reveal a match, rejecting the received fast re-authentication identity and stop; if comparing does reveal a match, determining a Master-Pseudo-Id and an inner_payload by applying a first decryption function to the outer_payload using the outer_ck; retrieving a subscriber password from a subscriber database using the Master-Pseudo-Id; generating an inner_mk by applying a second pseudo-random number function to an output of applying a second hashing function to a concatenation of the server-key and the subscriber password; extracting an inner_ck, wherein the inner_ck is a first 128 bits of the inner_mk; determining a master-key (MK) and a counter by applying a second decryption function to the inner_payload using the inner_ck; and regenerating master session key (MSK) and generating K_encr and K_aut using the master-key (MK) and the counter. - View Dependent Claims (14, 15, 16)
-
Specification