$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for authentication in a communication system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04M-011/00
출원번호 US-0282832 (1994-07-29)
발명자 / 주소
  • Brown Daniel P. (Elmhurst IL) Finkelstein Louis D. (Wheeling IL)
출원인 / 주소
  • Motorola, Inc. (Schaumburg IL 02)
인용정보 피인용 횟수 : 136  인용 특허 : 0

초록

A method and apparatus for authenticating a roaming subscriber. In a preferred embodiment, a subscriber receives a challenge that is in a format of a local authentication protocol, and determines whether the local authentication protocol is the subscriber\s home system authentication protocol. If it

대표청구항

A method of generating authentication information for use in authenticating a subscriber unit communicating via a communication unit of a visited communication system using a first authentication protocol, the subscriber unit and a home communication system of the subscriber unit each storing a subs

이 특허를 인용한 특허 (136)

  1. Rose, Gregory Gordon; Semple, James; Quick, Roy Franklin, Apparatus and method for a secure broadcast system.
  2. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  3. Yoon, Kyeong-Cheol, Apparatus and method for displaying information in folder type communication terminal.
  4. Butler Theodore ; Wong Marcus, Apparatus and method for encryption key generation.
  5. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  6. Ohkoshi, Takehiro; Yamada, Keiki; Makita, Satoru, Authenticated device, authenticating device and authenticating method.
  7. Haverinen,Henry; Honkanen,Jukka Pekka; Kuikka,Antti; Asokan,Nadarajah; Flykt,Patrik; Ala Laurila,Juha; Rinnemaa,Jyri; Takam채ki,Timo; Vuonnala,Raimo; Ekberg,Jan Erik; Mikkonen,Tommi; Aalto,Petri; Hon, Authentication in a packet data network.
  8. Aura, Tuomas, Authentication method.
  9. Ohashi Masayoshi (Saitama JPX) Takeuchi Yoshio (Saitama JPX) Suzuki Toshinori (Tokyo JPX) Yamaguchi Akira (Tokyo JPX) Sakai Seiichiro (Tokyo JPX) Mizuno Toshio (Saitama JPX), Authentication method for mobile communications.
  10. Campagna, Matthew John; Lambert, Robert John; Rosati, Anthony, Authentication of a mobile device by a network and key generation.
  11. Wallentin,Pontus; Elmdahl,Per; Norstrand,Ingrid, Authentication of termination messages in telecommunications system.
  12. Reeves, Raymond E.; Peden, Mark; Youngs, Simon; Koller, Gary, Authentication over a first communication link to authorize communications over a second communication link.
  13. Hoogerwerf David N. ; Stanhope David M. ; Barrere William Gerrit ; Green Evan R. ; McKernan Randolph W., Automated forced call disruption for use with wireless telephone systems.
  14. Tourrilhes, Jean; Krishnan, Venkatesh, Automatically configuring a communication interface of a device for connection with a wireless communication network.
  15. Hirsh, Robert Bruce, Brokering a connection to access a secured service.
  16. Ahn,Byung Ik; Yun,Chan Ho; Jeung,Yuon Pil; Lee,Kwang Wouk; Kang,Cheol Hyun; Choi,Seong Jin, CDMA terminal for providing roaming service to GSM service subscriber in CDMA service area.
  17. Blom,Rolf, Challenge-response user authentication.
  18. Ahvenainen Jouko,FIX, Checking the access right of a subscriber equipment.
  19. Ahvenainen Jouko,FIX, Checking the access right of a subscriber equipment.
  20. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering as a part of the multicast concept.
  21. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering data for transmission in a network.
  22. Kuriki Shigeya,JPX, Communication system capable of using a plurality of subscriber identity media sharing a single subscriber identity info.
  23. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  24. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  25. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  26. Wilkinson, Timothy J.; Guthery, Scott B.; Krishna, Ksheerabdhi; Montgomery, Michael A., Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form.
  27. P��glion,Marc, Controlling roaming in a mobile system.
  28. Pawa Robert L. ; Maxfield David R. ; Nemirovsky Gary ; Duncan Jeffrey W., Conversion system used in billing system for mobile satellite system.
  29. Kirby Richard Steven, Debit service systems and methods for wireless units.
  30. Kirby Richard Steven, Debit service systems and methods for wireless units.
  31. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  32. Amin Umesh J. ; Rowe Lorin B. ; Waughman Russell John, Detection of fraudulently registered mobile phones.
  33. Jeal, David; Debney, Charles William, Device and method for authenticating a transaction with a data processing apparatus.
  34. Pfitzmann, Birgit; Waidner, Michael, Efficient browser-based identity management providing personal control and anonymity.
  35. Zick, Donald A.; Klein, Michael J.; Moskowitz, Robert G., Enhanced shared secret provisioning protocol.
  36. Zick,Donald A.; Klein,Michael J.; Moskowitz,Robert G., Enhanced shared secret provisioning protocol.
  37. Sollee Patrick, Flow control of authentication triplet request for reducing usage time of a central processor.
  38. Kang, Sang-Eun; Choi, Young-Keun, Image security method and display method of portable terminal.
  39. Vialen, Jukka; Niemi, Valtteri, Integrity check in a communication system.
  40. Vialen, Jukka; Niemi, Valtteri, Integrity check in a communication system.
  41. Hsu, Raymond T., Inter-working function for a communication system.
  42. Berger, H. Stephen; Gilmore, Dillard; Fazio, Joseph D.; Chojar, Sunil, Intergrated hearing aid for telecommunications devices.
  43. Pan,Jung Lin; DiFazio,Robert A.; Tsai,Yingming, Joint channel equalizer interference canceller advanced receiver.
  44. Campagna, Matthew John; Brown, Daniel Richard L.; Ebeid, Nevine Maurice Nassif, Key agreement for wireless communication.
  45. Campagna, Matthew John; Brown, Daniel Richard L.; Ebeid, Nevine Maurice Nassif, Key agreement for wireless communication.
  46. Campagna, Matthew John; Brown, Daniel Richard L.; Ebeid, Nevine Maurice Nassif, Key agreement for wireless communication.
  47. Campagna, Matthew John; Brown, Daniel Richard L.; Ebeid, Nevine Maurice Nassif, Key agreement using a key derivation key.
  48. Hirsh, Robert B., Leveraging a persistent connection to access a secured service.
  49. Hirsh, Robert B., Leveraging a persistent connection to access a secured service.
  50. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  51. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  52. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  53. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  54. Esa Turtiainen FI, METHOD, APPARATUS, AND ARRANGEMENT FOR AUTHENTICATING A USER TO AN APPLICATION IN A FIRST COMMUNICATIONS NETWORK BY MEANS OF A MOBILE STATION COMMUNICATING WITH THE APPLICATION THROUGH A SECOND COMMU.
  55. Brown Daniel Peter (Elmhurst IL) Finkelstein Louis David (Wheeling IL), Method and apparatus for authentication in a communication system.
  56. Agashe, Parag A.; Quick, Jr., Roy Franklin; Wang, Jun; Hsu, Raymond T., Method and apparatus for broadcast services in a communication system.
  57. Leung, Nikolai K. N.; Sinnarajah, Ragulan, Method and apparatus for broadcast signaling in a wireless communication system.
  58. Hawkins, Jeffrey C.; Sipher, Joseph K.; Lincke, Scott D., Method and apparatus for communications over low bandwidth communications networks.
  59. Jacobs Pamela J. ; Lamb James A., Method and apparatus for configuration of authentication center operations in a mobile telephone system.
  60. Berenzweig, Adam L., Method and apparatus for performing authentication in communication systems.
  61. Semple, James; Rose, Gregory Gordon, Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system.
  62. Leung, Nikolai K. N., Method and apparatus for providing protocol options in a wireless communication system.
  63. James A. Lamb ; Pamela J. Jacobs, Method and apparatus for providing switch capability mediation in a mobile telephone system.
  64. Lamb James A. ; Jacobs Pamela J., Method and apparatus for providing switch capability mediation in a mobile telephone system.
  65. Hawkes, Philip; Rose, Gregory G.; Hsu, Raymond T.; Rezaiifar, Ramin, Method and apparatus for security in a data processing system.
  66. Leung, Nikolai Konrad; Hawkes, Philip Michael; Rose, Gregory Gordon, Method and apparatus for security in a data processing system.
  67. Hsu, Raymond T., Method and apparatus for transmission framing in a wireless communication system.
  68. Lincoln, Adrian David; Debney, Charles William; Maxwell, Ian Ronald; Viney, Jonathan Lawrence, Method and apparatus in combination with a storage means for carrying out an authentication process for authenticating a subsequent transaction.
  69. Laurila, Pasi, Method and arrangement for controlling a mobile subscription in a module communication system.
  70. Brune,Peter; Feuser,Ulrike; Langer,Michael; Ljungstr철m,Patrik; Michel,Uwe; Mohrs,Walter; Ptacek,Wolfgang, Method and device for accessing a telecommunications network and for billing telecommunication services.
  71. Zhou, Tong; Schnellbacher, George Jason, Method and system for anonymous operation of a mobile node.
  72. Zhou, Tong; Schnellbacher, George Jason, Method and system for anonymous operation of a mobile node.
  73. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  74. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  75. Park, Jeon-Man; Roo, Kyung-Yun, Method and system for using SIM card in CDMA service area.
  76. Vedder,Klaus, Method for authenticating a chip card in a message transmission network.
  77. Haverinen, Henry, Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device.
  78. Lahti Aapo,FIX, Method for calling by a terminal, like a card controlled mobile station, of a mobile communication system.
  79. Einola,Heikki; Rajaniemi,Jaakko; Hulkkonen,Tony; B?ck,Juha, Method for controlling connections to a mobile station.
  80. Raith, Alex Krister, Method for mating a mobile terminal with a cordless phone system.
  81. Le, Franck; Faccin, Stefano M., Method for updating a routing entry.
  82. Le, Franck; Faccin, Stefano M., Method for updating a routing entry.
  83. Tuomas Aura FI, Method for user identity protection.
  84. Schellinger Michael J., Method for validating a communication link.
  85. Vialen, Jukka; Longoni, Fabio, Method of ciphering data transmission in a radio system.
  86. Fauconnier, Denis; Mousset, Claire, Method of controlling a channel between a radio terminal and a cellular radiocommunication infrastructure, and access network implementing such a method.
  87. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  88. Raith,Alex Krister, Method to control the update frequency of a positioning device by a mobile terminal.
  89. Floden Anders,SEX ; Darroch John,SEX ; Johansson Lena,SEX ; Johannsen Berndt Ove,SEX, Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network.
  90. Antti,Huima, Method, element and system for securing communication between two parties.
  91. Lincke,Scott D.; Marianetti, II,Ronald; Sipher,Joseph K., Method, system and apparatus using a sensory cue to indicate subsequent action characteristics for data communications.
  92. Vanhatalo,Aki; Kokkonen,Jari, Methods and devices for transferring a secret to enable authenticated wireless communication.
  93. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  94. McGregor,D. Scott; McGregor,Greg, Mobile phone with internal accounting.
  95. Shah Bharat, Mobile station having lock code based on secure value.
  96. Bast, Christopher De, Mobile telephone with improved man machine interface.
  97. De Bast, Christopher, Mobile telephone with improved man machine interface.
  98. De Bast, Christopher, Mobile telephone with improved man machine interface.
  99. Jacobson, Terry; Rollender, Douglas Harold; Marcovici, Michael, One-way roaming from ANS-41 to GSM systems.
  100. Meche Paul S. (Richardson TX) Vaisanen Ahti (Del Mar CA), Over the air locking of user identity modules for mobile telephones.
  101. Patel, Sarvar M., Performing authentication in a communications system.
  102. Patel,Sarvar M., Performing authentication in a communications system.
  103. Krishnan, Chidambaram; Hutchison, IV, James A.; Summers, Tom, Power management for subscriber identity module.
  104. Zaus, Robert, Protocol expansion of a signaling message.
  105. Szabo Laszlo,DEX, Radio system for a closed user group.
  106. Tomoike Hiroyuki,JPX, Roaming method capable of improving roaming registration procedure.
  107. Kiessling, Johan; Do, Than Van, Sat back channel security solution.
  108. Buddhikot, Milind M; Garay, Juan A; Miller, Scott C; Salgarelli, Luca, Scheme for authentication and dynamic key exchange.
  109. Smeets, Bernard; Selander, Goran; Nerbrant, Per-Olof, Secure implementation and utilization of device-specific security data.
  110. Torvinen,Vesa; Sahlin,Bengt; Hautakorpi,Jani, Secure network/service access.
  111. Bostley ; III Phil J. ; Srinivasan Raghavan ; Eckhardt Andrew D., Secure processing for authentication of a wireless communications device.
  112. Grilli, Francesco; Casaccia, Lorenzo; Semple, James; Agashe, Parag A., Secure registration for a multicast-broadcast-multimedia system (MBMS).
  113. Nikander, Pekka; Arkko, Jari, Secure traffic redirection in a mobile communication system.
  114. Näslund, Mats; Norrman, Karl; Goldbeck-Löwe, Tomas, Security and privacy enhancements for security devices.
  115. Fenton Christopher John,GBX ; Clapton Alan James,GBX, Short code dialling.
  116. Zhang,Jianming; Song,Song, Short message gateway, system and method of providing information service for mobile telephones.
  117. Krishnan,Chidambaram; Hutchison, IV,James A.; Summers,Tom, Subscriber identity module verification during power management.
  118. Peck, Richard W., Subscriber validation method in cellular communication system.
  119. Meirzon, Tal; Nordenberg, Ido, Switching VSAT transmitter with smart stand-by mode.
  120. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  121. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  122. Beehler,Ryan; Dentamaro,Joseph; Edwards,Ryan; Schroeder,Michael; Showalter,David; Stouffer,Peter; Wilson,Shane, System and method for controlling a vehicle security system.
  123. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  124. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  125. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  126. Lovell, Jr., Robert C., System and method for enhanced content access.
  127. Lovell, Jr., Robert C., System and method for enhanced content access.
  128. Broyles, Samuel K.; Quick, Jr., Roy Franklin, System and method for preventing replay attacks in wireless communication.
  129. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  130. Alex Krister Raith, System proximity detection by mobile stations.
  131. Reznik,Alexander, Telescoping window based equalization.
  132. Torvinen, Vesa Matti; Lehtovirta, Vesa Petteri; Wifvesson, Monica, User authentication and authorisation in a communications system.
  133. Wilkinson Timothy J.,GBX ; Guthery Scott B. ; Krishna Ksheerabdhi ; Montgomery Michael A., Using a high level programming language with a microcontroller.
  134. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  135. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  136. Nadi S. Findikli ; Inderpreet S. Ahluwalia ; Hans Carlson ; Annika B. Lindh, Wireless communications device having externally controlled transmission of identity.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로