$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for authentication in a wireless telecommunications system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • H04L-009/00
출원번호 US-0453612 (1999-12-03)
발명자 / 주소
  • Abrol, Nischal
  • Lioy, Marcello
출원인 / 주소
  • Qualcomm Incorporated
대리인 / 주소
    Wadsworth Philip R.
인용정보 피인용 횟수 : 50  인용 특허 : 4

초록

A method and apparatus for allowing a mobile station in a wireless network to perform network authentication in association with mobile packet data services. The packet data serving node (PDSN) does not authenticate the mobile station with an authentication server prior to sending a CHAP success mes

대표청구항

1. A method of establishing a communication link with a remote station comprising the steps of:generating an authentication challenge message;sending said authentication challenge message to the remote station;receiving an authentication challenge response message from the remote station, wherein sa

이 특허에 인용된 특허 (4)

  1. Michael M. Swift ; Bharat Shah, Challenge-response authentication and key exchange for a connectionless security protocol.
  2. Luneau Greg,CAX ITX R3T 3M3 ; Remillard Jason,CAX ITX R2J 2L4 ; King Thomas, Method for providing secured commerical transactions via a networked communications system.
  3. Gilhousen Klein S. (San Diego CA) Jacobs Irwin M. (La Jolla CA) Weaver ; Jr. Lindsay A. (San Diego CA), Spread spectrum multiple access communication system using satellite or terrestrial repeaters.
  4. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench ; Jr. Edwin H., Stand alone device for providing security within computer networks.

이 특허를 인용한 특허 (50)

  1. McCann, Stephen; Hancock, Robert; May, John; Hook, Michael, Access authentication system.
  2. Wada,Mitsuhiro; Nakazawa,Hiroaki; Sueyoshi,Noriyuki; Murakami,Yasuo; Miyata,Hiroaki, Access server with function of collecting communication statistics information.
  3. Mukherjee, Arghya; Bhupalam, Bhaskar; Kabadi, Ashwin Anilkumar; Muppala, Venkatanarayana, Allowing network access for proxy mobile IP cases for nodes that do not support CHAP authentication.
  4. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Authentication procedures for managing mobile device applications.
  5. Quayle, Roger Phillip; Jones, William John; Jones, Alan Edward, Cellular wireless internet access system using spread spectrum and internet protocol.
  6. Bluestone, Derek; Adams, Clint; Yalamarti, Srinivas; Lebel, Pierre-Philippe, Client-side network access policies and management applications.
  7. Kurita, Shigetaka; Hirose, Norihiko; Nakatsuchi, Masaharu; Sasaki, Keizaburo, Communication system for mobile devices.
  8. Halme,Matti, Data transmission control and performance monitoring method of an IPSec link in a virtual private network.
  9. Chowdhury,Kuntal; Wenzel,Peter W., Discovering an address of a name server.
  10. Patel, Alpesh S.; Leung, Kent K.; Salowey, Joseph A.; Shao, Yu Cheng, EAP/SIM authentication for mobile IP to leverage GSM/SIM authentication infrastructure.
  11. Kwak, Seunghwan; Park, Jonghoon; Han, Jungpyo; Lee, Sangyun; Oh, Sehyun; Kim, Sung; Lee, Myungsung; Kim, Namgyu; Yang, Hojin; Ha, Seongho; Ihm, Jongtae, Fast data-link connection method for saving connection time in CDMA 2000 network.
  12. Tan, Pek Yew; Cheng, Hong; Ue, Toyoki, Identification information protection method in WLAN inter-working.
  13. Wenzel,Peter; Chowdhury,Kuntal, Identification of unused resources in a packet data network.
  14. Dommety, Gopal; Patel, Alpesh, Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices.
  15. Dommety,Gopal; Patel,Alpesh, Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices.
  16. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications.
  17. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications in a wireless network.
  18. Pecen, Mark; Andersen, Niels Peter Skov; Periyalwar, Shalini Suresh; Campagna, Matthew, Managing mobile device applications on a mobile device.
  19. Raphaeli,Dan; Bassin,Evgeny; Mushkin,Mordechai; Kaufman,Oren; Rosing,Tanya, Mechanism for detecting intrusion and jamming attempts in a shared media based communications network.
  20. Chowdhury,Kuntal; Manning,Serge; Boulos,Pierre, Method and apparatus for dynamically assigning a home agent.
  21. Boehmer, Bernhard; Leitgeb, Manfred, Method and arrangement for controlling access to data in mobile communications networks.
  22. Edgett,Jeff Steven; Sunder,Singam, Method and system for associating a plurality of transaction data records generated in a service access system.
  23. Lim,Byung Keun, Method and system for packet data transmission.
  24. Kupsh, Jerry; Chen, Xuming, Method and system for securely delivering authentication-related data.
  25. Edgett, Jeff Steven; Nelson, Barbara; Vollbrecht, John Robert; Albert, Roy David; Underwood, James Marion; Bullock, Blair Thomas, Method and system for verifying and updating the configuration of an access device during authentication.
  26. Sunder, Singam; Edgett, Jeff Steven; Albert, Roy David, Method and system of providing access point data associated with a network access point.
  27. Cao, Wenli, Method for preventing IP address from unexpected dispersion when using point-to-point protocol.
  28. Leung, Kent K.; Gundavelli, Srinath, Methods and apparatus for authenticating mobility entities using kerberos.
  29. Gundavelli, Srinath; Leung, Kent; Patel, Alpesh, Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP.
  30. Gundavelli, Srinath; Leung, Kent; Patel, Alpesh, Methods and apparatus for bootstrapping mobile-foreign and foreign-home authentication keys in mobile IP.
  31. Patel,Alpesh; Leung,Kent K.; Raab,Stefan; Dommety,Gopal, Methods and apparatus for dynamic session key generation and rekeying in mobile IP.
  32. Narayanan, Vidya; Ulupinar, Fatih; Wang, Jun; Dondeti, Lakshminath Reddy; Hsu, Raymond Tah-Sheng, Methods and apparatus for providing PMIP key hierarchy in wireless communication networks.
  33. Nicodemus, Blair Gaver; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  34. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  35. Nicodemus, Blair; Stephens, Billy Edison, Methods and systems for controlling access to computing resources based on known security vulnerabilities.
  36. Vashi, Prashant H.; Elangovan, Thanigaivelu; Yerrabommanahalli, Vikram Bhaskara, Negotiating a session personality based at least in part on a roaming agreement.
  37. Teraoka, Hitomi; Nakahara, Naruhito, Packet data serving node and communication method using the same.
  38. Young,Albert; O'Hara,Bob; Nessett,Danny M.; Tsai,Joe; Chen,BoFu, Protected mutual authentication over an unsecured wireless communication channel.
  39. Dyck,Jeffrey Alan; Lioy,Marcello, Proxy authentication for tethered devices.
  40. Sharma, Shshank; Dyck, Jeffrey Alan; Lloy, Marcello, Proxy-encrypted authentication for tethered devices.
  41. Jing,Dongfeng; Perkins,Charles E., Secure key distribution protocol in AAA for mobile IP.
  42. Nikander, Pekka; Arkko, Jari, Secure traffic redirection in a mobile communication system.
  43. Carroll,Christopher; Clare,Varsha; Flynn,Gerry; Green,Brian; Rados,Steve; Thomas,Steve, Secure, efficient, and mutually authenticated cryptographic key distribution.
  44. Costa Requena,Jose; Immonen,Jukka; Aholainen,Markus; Hietasarka,Juha; Korhonen,Ossi; Ruutu,Jussi, System, apparatus, and method for providing generic internet protocol authentication.
  45. Nicodemus,Blair Gaver; Bluestone,Derek; Adams,Clinton; Pappano,Joseph E.; Pressman,Howard M., System, method, apparatus and computer program product for facilitating digital communications.
  46. Nicodemus, Blair Gaver; Bluestone, Derek; Adams, Clinton; Pappano, Joseph E.; Pressman, Howard M., System, method, apparatus, and computer program product for facilitating digital communications.
  47. Jones, William John; Bowring, Michael, Use of internet web technology to register wireless access customers.
  48. Williams, Andrew, Use of radius in UMTS to perform accounting functions.
  49. Porozni, Barry Ian; Nicodemus, Blair Gaver; Schille, Glenn Alan, Wireless access system, method, signal, and computer program product.
  50. King, Chao; Christ, John R., Wireless communication authentication process and system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로