$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Authentication system for digital cellular communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/02
출원번호 US-0556890 (1990-07-23)
발명자 / 주소
  • Dent Paul (Stehag SEX)
출원인 / 주소
  • Ericsson GE Mobile Communications Holding, Inc. (Paramus NJ 02)
인용정보 피인용 횟수 : 156  인용 특허 : 0

초록

A system for the authentication of mobile stations and base stations in a cellular communications network. The system includes an algorithm which generates not only a key dependent response to a random challenge, but also a temporary conversation key or call variable which may be used to encipher tr

대표청구항

A method for the generation of parameters for use in enhancing the security of communication in a communications system in which a mobile station is assigned a unique multi-digit permanent key and in which a changeable multi-digit rolling key is employed for increased security, both said permanent k

이 특허를 인용한 특허 (156)

  1. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  2. Johnson,Eric A.; Handzel,Mark J., Apparatus and method for credit based management of telecommunication activity.
  3. Johnson,Eric A.; Handzel,Mark J., Apparatus and method for credit based management of telecommunication activity.
  4. Balachandran Kumar ; Wang Yi-Pin Eric ; Massingill Larry William, Apparatus and method for deriving a random reference number from paging and originating signals.
  5. Johnson, Eric A.; Handzel, Mark J., Apparatus and method for detecting potentially fradulent telecommunication.
  6. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  7. Haartsen Jacobus C. (Staffanstorp SEX), Authentication and handover methods and systems for radio personal communications.
  8. Fehnel Michael David, Authentication key management for mobile stations.
  9. Ohashi Masayoshi (Saitama JPX) Takeuchi Yoshio (Saitama JPX) Suzuki Toshinori (Tokyo JPX) Yamaguchi Akira (Tokyo JPX) Sakai Seiichiro (Tokyo JPX) Mizuno Toshio (Saitama JPX), Authentication method for mobile communications.
  10. Oka Hiroyuki,JPX, Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus.
  11. Hu, Yimu, Authentication method for the mobile terminal and a system thereof.
  12. Dent, Paul, Authentication methods.
  13. Violante Anthony F. ; Sansone Ronald P., Authorized cellular telephone communication payment refill system.
  14. Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
  15. Mizikovsky Semyon ; Anderson Geoffrey ; Douma Peter ; Akahane Masaaki ; Yasuda Hiroshi,JPX, Automatic generation of private authentication key for wireless communication systems.
  16. Dent Paul Wilkinson,SEX ; Haartsen Jacobus Cornelius,SEX, Base station which relays cellular verification signals via a telephone wire network to verify a cellular radio telephon.
  17. Boatwright, John T., Call security system.
  18. Boatwright, John T., Call security system.
  19. Boatwright, John T., Call security system which detects fraud by examination of call history.
  20. Dent,Paul W., Calling channel in CDMA communications system.
  21. Uddenfeldt Jan E.,SEX ; Raith Alex K.,SEX, Cellular digital mobile radio system and method of transmitting information in a digital cellular mobile radio system.
  22. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  23. Daniels David Leighton, Cellular fraud prevention using selective roaming.
  24. Ryan ; Jr. Frederick W. ; Rosenberg Nathan, Cellular telephone authentication system using a digital certificate.
  25. Houde Michel,CAX ; Boudreau Alain,CAX, Cellular telephone network support of international mobile station identity (IMSI).
  26. Ozluturk, Fatih M., Circuit and software for generating a stream cipher.
  27. Bharathan Vipin ; Rajasekharan Ajit V. ; Shah Sugeet K. ; Story ; Jr. Guy A., Cloning protection scheme for a digital information playback device.
  28. Soliman, Hamdy, Computer system security via dynamic encryption.
  29. Johnson, Eric A.; Handzel, Mark J., Credit based management of telecommunication activity.
  30. Bailey Ken, Credit card operated cellular phone.
  31. Furuya,Soichi; Roe,Michael, Cryptographic apparatus and method.
  32. Carroll, Christopher P., Cryptographic techniques for a communications network.
  33. Carroll, Christopher P., Cryptographic techniques for a communications network.
  34. Carroll, Christopher P., Cryptographic techniques for a communications network.
  35. Carroll,Christopher Paul, Cryptographic techniques for a communications network.
  36. Dent, Paul W.; Dutta, Santanu, Demodulation method and apparatus in high-speed time division multiplexed packet data transmission.
  37. Santanu Dutta, Demodulation method in high speed asynchronous time division multiplexed packet data transmission.
  38. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  39. Dahan, Odi; Goren, Ori; Shvager, Yehuda, Device and method for securing software.
  40. Olivier Doutheau FR; Jean-Pierre Aucoeur FR; Jean-Francois Criqui FR; Jean-Noel Martin FR; Jean Charpentier FR, Device for connecting a telephone switch to a fixed telephone network via a radio telephone network.
  41. Dent Paul W. (Stehags SEX), Efficient paging system.
  42. Dent Paul W.,SEX, Efficient paging system with sleep mode duration determined by the guaranteed number of repeats.
  43. Faccin,Stefano; Le,Franck, Efficient security association establishment negotiation technique.
  44. Lerner Daniel M. ; MacLagan Charles Wesley ; Geiselman John M. ; Bobola Robert E. ; Sucilla Gregory A., Encryption key management system and method.
  45. Carroll, Christopher Paul; Frankel, Yair, Escrowed key distribution for over-the-air service provisioning in wireless communication networks.
  46. Ericsson Ted,SEX, Extended sleep mode method and apparatus.
  47. Dick,Stephen G.; Bolourchi,Nader; Shin,Sung Hyuk, Generation of user equipment identification specific scrambling code for high speed shared control channel.
  48. Reece,Richard W., Global encryption system.
  49. Jan E. Uddenfeldt SE; Alex K. Raith, Handover method for mobile radio system.
  50. Jan E. Uddenfeldt SE; Alex K. Raith, Handover method for mobile radio system.
  51. Uddenfeldt Jan E.,SEX ; Raith Alex K., Handover method for mobile radio system.
  52. Uddenfeldt Jan-Erik,SEX ; Raith Alex K., Handover method for mobile radio system.
  53. Barany, Peter A.; Bontu, Chandra S., Interleaving data over frames communicated in a wireless channel.
  54. Barany, Peter A.; Bontu, Chandra S., Interleaving data over frames communicated in a wireless channel.
  55. Dent, Paul W., Key transforms to discriminate between beams in a multi-beam satellite communication system.
  56. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  57. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  58. Sawyer Francois,CAX, Local control enhancement in a telecommunications system.
  59. Griffith, Gregory Clyde; Guidotti, Richard Allen; Saitta, David A.; Norman, Daniel P., Memory device for a cellular telephone.
  60. Griffith, Gregory Clyde; Guidotti, Richard Allen; Saitta, David A.; Norman, Daniel P., Memory device for a cellular telephone.
  61. Griffith,Gregory Clyde; Guidotti,Richard Allen; Saitta,David A.; Norman,Daniel P., Memory device for a cellular telephone.
  62. Eastlake, III, Donald E., Method and apparatus for authentication of mobile devices.
  63. Jacobs Pamela J., Method and apparatus for automated SSD updates on an a-key entry in a mobile telephone system.
  64. Jacobs Pamela J. ; Lamb James A., Method and apparatus for configuration of authentication center operations in a mobile telephone system.
  65. Janhila Pertti,FIX, Method and apparatus for controlling the right of use/activating of a mobile station which uses at least two predefined.
  66. Rydbeck Nils Rutger, Method and apparatus for controlling transceiver operations in a radio communications system to reduce same channel fre.
  67. Brown Daniel Peter (Elmhurst IL) Finkelstein Louis David (Wheeling IL) Smolinske Jeffrey Charles (Hoffman Estates IL), Method and apparatus for efficient real-time authentication and encryption in a communication system.
  68. Jacobs Pamela J., Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system.
  69. Kaminsky William J., Method and apparatus for exchanging RF signatures between cellular telephone systems.
  70. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  71. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  72. Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Method and apparatus for fraud control in cellular telephone systems.
  73. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  74. Fatih M. Ozluturk, Method and apparatus for generating a stream cipher.
  75. Ozluturk Fatih M., Method and apparatus for generating a stream cipher.
  76. Ozluturk Fatih M., Method and apparatus for generating a stream cipher.
  77. Lamb James A., Method and apparatus for providing fraud protection mediation in a mobile telephone system.
  78. Lamb James A., Method and apparatus for providing fraud protection mediation in a mobile telephone system.
  79. James A. Lamb ; Pamela J. Jacobs, Method and apparatus for providing switch capability mediation in a mobile telephone system.
  80. Lamb James A. ; Jacobs Pamela J., Method and apparatus for providing switch capability mediation in a mobile telephone system.
  81. Cao, Qiang; Venceslas Charriere, Patrick Georges; Cheng, Fang-Chen; Tatesh, Said; Young, Gordon Peter, Method and apparatus for reducing signalling load in mobile telecommunications networks.
  82. Geiselman, John Milton; Bobola, Robert E.; Lerner, Daniel M., Method and apparatus for securing communications.
  83. J. Milton Geiselman ; Robert E. Bobola ; Daniel M. Lerner, Method and apparatus for securing digital communications.
  84. Blanchard Scott David ; Vanden Heuvel Dean Paul ; Lester Joseph Olk, Method and apparatus for signaling privacy in personal communications systems.
  85. Underseth Mark ; Matsuoka Nobusuke,JPX, Method and device for majority vote optimization over wireless communication channels.
  86. Yoshio Takahashi JP; Hidemi Moribatake JP, Method and system for controlling key for electronic signature.
  87. Faccin, Stefano; Le, Franck, Method and system for delegation of security procedures to a visited domain.
  88. Dent, Paul W.; Ramesh, Rajaram, Method and system for the transmission, reception and processing of 4-level and 8-level signaling symbols.
  89. Yu, Won Uk, Method for accessing internet using internet TV.
  90. Vapaakoski Simo,FIX ; Raisio Jukka,FIX ; Suhonen Timo,FIX, Method for checking the compatibility of a mobile station and a functional unit; a mobile station and a functional unit.
  91. Totaro Antoine,FRX ; Flores Erick,FRX, Method for enabling direct encrypted communication between two terminals of a mobile radio network, and corresponding station and terminal facilities.
  92. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  93. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  94. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  95. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  96. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  97. Arne Norefors SE; Yi Cheng SE; Lorens Almehag SE; Karl Dan Gustav Jerrestam SE, Method for secure handover.
  98. Okazaki, Satomi; Takeshita, Atsushi; Yin, Yiqun; Yokote, Aki, Method for securing access to mobile IP network.
  99. Euchner,Martin; Lotz,Volkmar; Mödersheim,Sebastian; Tej,Haykal, Method for securing data traffic in a mobile network environment.
  100. Dent, Paul W.; Rydbeck, Nils, Method of bilateral identity authentication.
  101. Howard,Joe, Method of controlling a network entity and a mobile station.
  102. Sanmugam K. Raj,GBX, Method of detecting fraud in a radio communications network by analyzing activity, identification of RF channel data for.
  103. Daly Brian Kevin ; Owens Leslie Dale, Method of mutual authentication for secure wireless service provision.
  104. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  105. Ivan Pereira daSilva, Methods and apparatus for mobile phone power management.
  106. Smeets, Bernhard Jan Marie, Methods and arrangements for secure linking of entity authentication and ciphering key generation.
  107. Persson,Bengt Yngve; Gudmundson,Bj?rn; Dent,Paul Wilkinson, Mobile assisted handover using CDMA.
  108. Persson,Bengt Yngve; Gudmundson,Bj?rn; Dent,Paul Wilkinson, Mobile assisted handover using CDMA.
  109. Karabinis, Peter D., Mobile satellite phone system incorporating symmetrical and non-symmetrical waveform modes.
  110. Shah Bharat, Mobile station having lock code based on secure value.
  111. Hiroshi Kanno JP; Yuuichi Abe JP; Hiroshi Ito JP; Tatsuo Hayashi JP, Mobile telecommunication station.
  112. Kanno Hiroshi,JPX ; Abe Yuuichi,JPX ; Ito Hiroshi,JPX ; Hayashi Tatsuo,JPX, Mobile telecommunication station.
  113. Dent,Paul W., Multi-signal transmit array with low intermodulation.
  114. Paul W. Dent, Multi-signal transmit array with low intermodulation.
  115. Dent Paul W. ; Bottomley Gregory E., Multiple access coding for radio communications.
  116. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  117. Busch, Michael-Rainer; Miksch, Andreas, Process for detecting defective component exchanges.
  118. Herwono, Ian; Hodgson, Paul W, Provision of secure communications connection using third party authentication.
  119. Xin, Yan; Wu, Huan; Seetharam, Raveendra, Randomization of plain text for GSM SACCH.
  120. Elliott, Karl E.; Garrard, Kenneth W.; Huang, Andy; Gratzer, Peter, Real time dynamic client access control.
  121. Dent Paul W. ; Rydbeck Nils R. ; Raith A. Krister ; Sawyer Francois,CAX, Reduced power sleep modes for mobile telephones.
  122. Schilling, Donald L., Removable card for use in a communication unit.
  123. Schilling,Donald L., Removable card for use in a radio unit.
  124. Dent,Paul W., Satellite communications system using multiple earth stations.
  125. Bartholomew David B. ; Ivie A. Ray ; Schurig Alma K., Secure access telephone extension system and method in a cordless telephone system.
  126. Dent Paul Wilkinson,SEX ; Haartsen Jacobus Cornelius,SEX, Secure radio personal communications system and method.
  127. Sexton, Bonnie C., Small hardware implementation of the subbyte function of rijndael.
  128. Patel Sarvar, Strengthening the authentication protocol.
  129. Ozluturk, Fatih M., Subscriber unit for generating a stream cipher.
  130. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  131. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  132. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  133. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  134. Charas,Philippe, System and method for local policy enforcement for internet service providers.
  135. Broyles, Samuel K.; Quick, Jr., Roy Franklin, System and method for preventing replay attacks in wireless communication.
  136. Mankovitz Roy J., System and method for programming electronic devices from a remote site.
  137. Wu, Chwan-Hwa; Irwin, J. David; Wang, Chien-Cheng; Huang, Chun-Ching, System and method for protecting communication devices from denial of service attacks.
  138. Wu, Chwan-Hwa; Irwin, J. David; Wang, Chien-Cheng, System and method for protecting network resources from denial of service attacks.
  139. Wu, Chwan-Hwa; Irwin, J. David; Wang, Chien-Cheng, System and method for protecting network resources from denial of service attacks.
  140. Wu, Chwan-Hwa; Irwin, J. David; Wang, Chien-Cheng, System and method for protecting network resources from denial of service attacks.
  141. Garrard, Kenneth W.; Elliott, Karl E.; Huang, Andy, System and method for providing unified transport and security protocols.
  142. Garrard, Kenneth W.; Elliott, Karl E.; Huang, Andy, System and method for providing unified transport and security protocols.
  143. Garrard, Kenneth W.; Elliott, Karl E.; Huang, Andy, System and method for providing unified transport and security protocols.
  144. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  145. Yamazaki, Shunpei; Koyama, Jun, System for identifying an individual, a method for identifying an individual or a business method.
  146. Balfanz, Dirk; Lopes, Cristina; Smetters, Diana; Stewart, Paul; Wong, Hao-Chi, Systems and methods for authenticating communications in a network medium.
  147. Ortiz, Sharon G.; Ortiz, Luis M., Systems and methods for enabling temporary, user-authorized cloning of mobile phone functionality on a secure server accessible via a remote client.
  148. Ilnicki, Slawomir K.; Kanevsky, Valery; Curran-Gray, Martin, Systems and methods for producing pseudo-random number distributions in devices having limited processing and storage capabilities.
  149. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  150. Dent Paul W., Use of duplex cipher algorithms for satellite channels with delay.
  151. Dick, Stephen G.; Bolourchi, Nader; Shin, Sung Hyuk, User equipment identification specific scrambling.
  152. Dick, Stephen G.; Bolourchi, Nader; Shin, Sung-Hyuk, User equipment identification specific scrambling.
  153. Dick, Stephen G.; Bolourchi, Nader; Shin, Sung-Hyuk, User equipment identification specific scrambling.
  154. Alanara Seppo (Oulu FIX) Berson Thomas (Palo Alto CA), Variable security level encryption.
  155. Liu, Robert G.; Yeo, Boon-Lock; Yeung, Minerva Ming-Yee; Tesler, Dmitriy; Ramachandran, Subrahmanyam, Video bit scrambling.
  156. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로